Archive_Zip (Zip file management class) Directory traversal
- To: bugtraq@xxxxxxxxxxxxxxxxx, bugs@xxxxxxxxxxxxxxxxxxx, support@xxxxxxxxxxx, "content-editor@xxxxxxxxxxxxxxxxx" <content-editor@xxxxxxxxxxxxxxxxx>, "editor@xxxxxxxxxxxxxxxxx" <editor@xxxxxxxxxxxxxxxxx>, "expert@xxxxxxxxxxxxxx" <expert@xxxxxxxxxxxxxx>, "news-editor@xxxxxxxxxxxxxxxxx" <news-editor@xxxxxxxxxxxxxxxxx>, "vuldb@xxxxxxxxxxxxxxxxx" <vuldb@xxxxxxxxxxxxxxxxx>, "vuln@xxxxxxxxxxx" <vuln@xxxxxxxxxxx>, "webmaster@xxxxxxxxxxx" <webmaster@xxxxxxxxxxx>, "webmaster@xxxxxxxxxxxxxxxxx" <webmaster@xxxxxxxxxxxxxxxxx>
- Subject: Archive_Zip (Zip file management class) Directory traversal
- From: h e <het_ebadi@xxxxxxxxx>
- Date: Sat, 25 Feb 2006 01:28:24 -0800 (PST)
- Domainkey-signature: a=rsa-sha1; q=dns; c=nofws; s=s1024; d=yahoo.com; h=Message-ID:Received:Date:From:Subject:To:MIME-Version:Content-Type:Content-Transfer-Encoding; b=N1NgGnBZw1IOLpLWQNKjvWTFfDIgb/JAskqV/rw2eo1hVhGC/DwbmWOO/tZvDzrjccggWzSAkSFaoDc86MQ+e/F16iT//3TS4a9ExlXC/w8GD52CTrIOGWaxjWswIa1Y+7j/hamwALWof8n7A3hUzng//2oaLI9z0mnIa3GhRKs= ;
- List-help: <mailto:bugtraq-help@securityfocus.com>
- List-id: <bugtraq.list-id.securityfocus.com>
- List-post: <mailto:bugtraq@securityfocus.com>
- List-subscribe: <mailto:bugtraq-subscribe@securityfocus.com>
- List-unsubscribe: <mailto:bugtraq-unsubscribe@securityfocus.com>
- Mailing-list: contact bugtraq-help@xxxxxxxxxxxxxxxxx; run by ezmlm
Archive_Zipr (Zip file management class) Directory
traversal
This class provides handling of tar files in PHP.
It supports creating, listing, extracting and adding
to tar files.
Gzip support is available if PHP has the zlib
extension built-in or
loaded. Bz2 compression is also supported with the bz2
extension loaded.
http://www.phpconcept.net
http://www.zend.com/pear/whoiswho.php?pkg=Archive_Tar
http://pear.php.net/package/Archive_Tar
Credit:
The information has been provided by Hamid Ebadi
( Hamid Network Security Team) : admin@xxxxxxxxx
The original article can be found at :
http://hamid.ir/security
Vulnerable Systems:
Tested on zip.lib.php v 1.1
Detail :
Directory traversal while extracting (.ZIP)
What is Directory traversal in archivers?
that allowed one to create malicous archive files,
which would overwrite system files or place dangerous
files in defined directory(example :shell.php in
wwwroot directory)
This could be abused by sending an archive to a local
user who would unzip / untar an archive, the archive
would then be able to overwrite any file to which the
user has write permissions, thus it could also be
abused if a system ran som antivirus software which
automatically opened archive files.
harmless exploit:
use HEAP [Hamid Evil Archive Pack]
you can find it from Hamid Network Security Team:
http://www.hamid.ir/tools/
want to know more ?
http://www.hamid.ir/paper
Signature
__________________________________________________
Do You Yahoo!?
Tired of spam? Yahoo! Mail has the best spam protection around
http://mail.yahoo.com