exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Cloupia End-To-End FlexPod Management Directory Traversal

Cloupia End-To-End FlexPod Management Directory Traversal
Posted Jan 15, 2012
Authored by Chris Rock

Cloupia End-To-End FlexPod management suffers from a directory traversal vulnerability. jQuery File Tree is a configurable, AJAX file browser plugin for the jQuery javascript library utilized within the Cloupia application framework. Unauthenticated access to this module allows a remote attacker to browse the entire file system of the host server, beyond the realm of the web service itself.

tags | exploit, remote, web, javascript
SHA-256 | ff2259eefdd1326866c21277a83513321432a90dcb079b9ce2ebba2ff1882121

Cloupia End-To-End FlexPod Management Directory Traversal

Change Mirror Download
*Cloupia End-to-end FlexPod Management - Directory Traversal Vulnerability***

*Advisory Information*

Advisory ID: KUSTODIAN-2011-011

Date published: Jan 13, 2011

*Vulnerability Information*

Class: Directory Traversal

Remotely Exploitable: Yes

Locally Exploitable: Yes

*Software Description*

Provides end-to-end FlexPod management and automation across physical,
virtual, compute, storage and network resources.

Create internal private clouds rapidly with internal standards and
procedures to maximize the infrastructure investments.



Provides comprehensive physical and virtual infrastructure management and
automation.

Provides unified solution and single pane of glass for consistent and
connected experience across private, public & hybrid clouds.

*Vulnerability Description*

jQuery File Tree is a configurable, AJAX file browser plugin for the jQuery
javascript library utilised within the Cloupia application framework.

Unauthenticated access to this module allows a remote attacker to browse
the entire file system of the host server, beyond the realm of the web
service itself.

Cloupia are aware of this flaw and are releasing a patch to mitigate
access. End users are urged to update immediately by contacting the vendor.

http://www.cloupia.com



* **Technical Description*

The following process performed as an attacker to exploit this
vulnerability would be as follows:

The code for the jQuery File Tree Java-Server-Page file reads as follows:

<%@ page

import="java.io.File,java.io.FilenameFilter,java.util.Arrays"%>

<%

/**

* jQuery File Tree JSP Connector

* Version 1.0

* Copyright 2008 Joshua Gould

* 21 April 2008

*/

String dir = request.getParameter("dir");

if (dir == null) {

return;

}



if (dir.charAt(dir.length()-1) == '\\') {

dir = dir.substring(0, dir.length()-1) + "/";

} else if (dir.charAt(dir.length()-1) != '/') {

dir += "/";

}

if (new File(dir).exists()) {

String[] files = new File(dir).list(new FilenameFilter() {

public boolean accept(File dir, String name) {

return name.charAt(0) != '.';

}

});

Arrays.sort(files, String.CASE_INSENSITIVE_ORDER);

out.print("<ul class=\"jqueryFileTree\" style=\"display:
none;\">");

// All dirs

for (String file : files) {

if (new File(dir, file).isDirectory()) {

out.print("<li class=\"directory
collapsed\"><a href=\"#\" rel=\"" + dir + file + "/\">"

+ file + "</a></li>");

}

}

// All files

for (String file : files) {

if (!new File(dir, file).isDirectory()) {

int dotIndex = file.lastIndexOf('.');

String ext = dotIndex > 0 ?
file.substring(dotIndex + 1) : "";

out.print("<li class=\"file ext_" + ext +
"\"><a href=\"#\" rel=\"" + dir + file + "\">"

+ file + "</a></li>");

}

}

out.print("</ul>");

}

%>





*Credits*

This vulnerability was discovered by Chris Rock <team@kustodian.com> and
from Kustodian www.Kustodian.com.

*Disclaimer*

The contents of this advisory are copyright (c) Kustodian Security and may
be distributed freely provided that no fee is charged for this distribution
and proper credit is given.


Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close