Published:2013/11/29 Last Updated:2013/11/29
JVN#41703192
TOWN (modified version) vulnerable to directory traversal
Overview
TOWN (modified version) contains a directory traversal vulnerability.
Products Affected
- TOWN (modified version) 5_10 and earlier
Description
TOWN (modified version) provided by Tattyan's HP contains a directory traversal vulnerability.
Impact
A remote attacker may obtain arbitrary files on the server.
Solution
Apply an update
Update to the latest version according to the information provided by the developer.
Vendor Status
Vendor | Link |
Tattyan's HP | About two vulnerabilities of TOWN (CGI game) |
TOWN (modified version) and others |
References
JPCERT/CC Addendum
Vulnerability Analysis by JPCERT/CC
Analyzed on 2013.11.29
Measures | Conditions | Severity |
---|---|---|
Access Required | can be attacked over the Internet using packets |
|
Authentication | anonymous or no authentication (IP addresses do not count) |
|
User Interaction Required | the vulnerability can be exploited without an honest user taking any action |
|
Exploit Complexity | some expertise and/or luck required (most buffer overflows, guessing correctly in small space, expertise in Windows function calls) |
|
Credit
Misukuro reported this vulnerability to the developer.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
Other Information
JPCERT Alert | |
JPCERT Reports | |
CERT Advisory |
|
CPNI Advisory |
|
TRnotes |
|
CVE |
CVE-2013-6000 |
JVN iPedia |
JVNDB-2013-000112 |