Fool's Workshop Owl's Workshop 1.0 - 'readings/index.php' Arbitrary File Access

Author: G00db0y
type: webapps
platform: php
port: 
date_added: 2004-02-18  
date_updated: 2012-12-28  
verified: 1  
codes: CVE-2004-0303;OSVDB-4004  
tags:   
aliases:   
screenshot_url:   
application_url:   

raw file: 23726.txt  
source: https://www.securityfocus.com/bid/9689/info

Owl's Workshop is reported prone to multiple remote file-disclosure vulnerabilities because the application fails to validate user-supplied input passed via a URI parameter.

Upon successful exploitation of these issues, an attacker may be able to gain access to sensitive system files, potentially facilitating further attacks.

http://www.example.org/owls/readings/index.php?filename=/etc/passwd