Bug 20380

Summary: MLdonkey <= 2.9.7 HTTP DOUBLE SLASH Arbitrary File Disclosure vulnerability
Product: Sisyphus Reporter: Василий Терешко <tolmi>
Component: mldonkey-serverAssignee: Aeliya Grevnyov <gray_graff>
Status: CLOSED DUPLICATE QA Contact: qa-sisyphus
Severity: critical    
Priority: P3 CC: gray_graff
Version: unstable   
Hardware: all   
OS: Linux   

Description Василий Терешко 2009-06-09 11:44:49 MSD
MLdonkey (up to 2.9.7) has  a  vulnerability  that allows remote user to access any
file   with   rights   of  running  Mldonkey  daemon  by  supplying  a
special-crafted  request  (ok,  there's  not much special about double
slash) to an Mldonkey http GUI (tcp/4080 usually).

Reference:
https://savannah.nongnu.org/bugs/?25667

Thus, the exploit would be as simple as accessing any file on a remote
host with your browser and double slash:

http://mlhost:4080//etc/passwd

# milw0rm.com [2009-02-23]
Comment 1 Aeliya Grevnyov 2009-06-23 22:10:54 MSD
дубль

*** This bug has been marked as a duplicate of bug 20379 ***