Loading HuntDB...

It's possible to view configuration and/or source code on uchat.awscorp.uberinternal.com without

Medium
U
Uber
Submitted None
Reported by gregoryvperry

Vulnerability Details

Technical details and impact analysis

Improper Authentication - Generic
## Summary Configuration file and/or source code information leakage without Uber OneLogin SSO authentication. ## Security Impact Misconfiguration on the server results in information leakage without authentication. ## Reproduction Steps https://uchat.awscorp.uberinternal.com/static/main.740f5a0b92c00e72e2e1.js ## Specifics * http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2169 * http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0202 * https://www.owasp.org/index.php/Testing_for_Local_File_Inclusion ## Impact Access to internal configuration files, system names, and source code.

Related CVEs

Associated Common Vulnerabilities and Exposures

Directory traversal vulnerability in the true_path function in private.py for Mailman 2.1.5 and earlier allows remote attackers to read arbitrary files via ".../....///" sequences, which are not properly cleansed by regular expressions that are intended to remove "../" and "./" sequences.

Directory traversal vulnerability in source.php in Quick & Dirty PHPSource Printer 1.1 and earlier allows remote attackers to read arbitrary files via ".../...//" sequences in the file parameter, which are reduced to "../" when PHPSource Printer uses a regular expression to remove "../" sequences.

Report Details

Additional information and metadata

State

Closed

Substate

Informative

Submitted

Weakness

Improper Authentication - Generic