Published:2007/07/09  Last Updated:2008/05/21

JVN#33593387
KDDI sample CGI download program directory traversal vulnerability

Overview

A directory traversal vulnerability exists in a sample CGI download program included with KDDI's EZFactory.

Products Affected

  • Sample CGI download program

Description

A sample CGI download program is included with KDDI's EZFactory for downloading and saving data such as images and ringtones to EZweb compatible cellular phones. A directory traversal vulnerability exists in this program.

Impact

A remote anauthenticated attacker could access files on the server where this sample CGI download program is installed. This could lead to unintentional disclosure of file contents.

Solution

Update the Software
Please update to the version with CGI download security provided by the vendor.

Vendor Status

Vendor Status Last Update Vendor Notes
KDDI CORPORATION Vulnerable 2007/07/09

References

JPCERT/CC Addendum

Vulnerability Analysis by JPCERT/CC

Analyzed on 2007.07.09

Measures Conditions Severity
Access Required Routed - can be attacked over the Internet using packets
  • High
Authentication None - anonymous or no authentication (IP addresses do not count)
  • High
User Interaction Required None - the vulnerability can be exploited without an honest user taking any action
  • High
Exploit Complexity Low - little to no expertise and/or luck required to exploit (cross-site scripting)
  • High

Description of each analysis measures

Credit

Hiromitsu Takagi reported this vulnerability to IPA.
JPCERT/CC coordinated with the vendors under Information Security Early Warning Partnership.

Other Information

JPCERT Alert
JPCERT Reports
CERT Advisory
CPNI Advisory
TRnotes
CVE
JVN iPedia JVNDB-2007-000494

Update History