[VIM] Any clues? MHG Security Team --- Gallery Upload Vulnerabilities
Steven M. Christey
coley at mitre.org
Wed May 17 00:43:51 EDT 2006
# MHG Security Team --- Gallery Upload Vulnerabilities
http://archives.neohapsis.com/archives/bugtraq/2006-05/0250.html
Ummmmmmmm.... what?
1) some sources seem to have concluded that this is a file upload
problem. Did anybody do post-disclosure analysis to come to this
conclusion, or was it a best guess based on the words that the
researcher happened to use?
2) The researcher says "This Code Not Include..." and gives an example
of what is apparently client-side Javascript that tries to enforce
the type of document that will be uploaded. But is the researcher
saying that the products *DO* have this code, and are thus victims
of file upload issues because the client-side javascript can be
bypassed? OR, has the researcher suggested that the vulns in these
products are because the clients DON'T have code like this (thus
the researcher is proposing a vulnerable solution)
On a second glance, I think maybe by saying "This is Code Deleted
Your Scripts And All File Upload victim hosts," maybe the
researcher means: "if you delete this checking code from your [web
pages], then you can do file uploads." If so, then it would argue
for the products all having this same code - or maybe this was just
one example.
3) I don't see any immediate codebase relationships between some of
these products (besides obviously the duXYZ products), but *if* the
researcher is saying that the products all have this code, then
there's obviously a codebase relationship somewhere...
So, to summarize:
Ummmmmmmm.... what?
- Steve
More information about the VIM
mailing list