[UNIX] Arbitrary File Disclosure Vulnerability in SympollFrom: email@example.com
- Previous message: firstname.lastname@example.org: "[NEWS] Directory Traversal vulnerability in sendform.cgi"
- Messages sorted by: [ date ] [ thread ] [ subject ] [ author ] [ attachment ]
From: email@example.com To: firstname.lastname@example.org Date: Wed, 31 Jul 2002 13:29:04 +0200 (CEST)
The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion
When was the last time you checked your server's security?
How about a monthly report?
http://www.AutomatedScanning.com - Know that you're safe.
- - - - - - - - -
Arbitrary File Disclosure Vulnerability in Sympoll
<http://www.ralusp.net/heterodox/sympoll.php> Sympoll is a customizable
voting booth system. It is written using PHP and requires access to a
MySQL database. A security vulnerability in the product allows remote
attackers to read the content of arbitrary files.
* Sympoll version 1.2
* Sympoll version 1.3
A missing variable integrity check allows arbitrary files to be viewed on
a web server that hosts Sympoll. Hosts that have disabled the
register_globals directive in their php.ini file are not at risk.
This vulnerability was reported to the Sympoll author on Tuesday, July 30
2002 at approximately 13:45 EST. A new version with a verified fix was
released by 16:15 EST the same day. It can be downloaded from
The information has been provided by <mailto:email@example.com> David
This bulletin is sent to members of the SecuriTeam mailing list.
To unsubscribe from the list, send mail with an empty subject line and body to: firstname.lastname@example.org
In order to subscribe to the mailing list, simply forward this email to: email@example.com
The information in this bulletin is provided "AS IS" without warranty of any kind.
In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.