Xorux LPAR2RRD Vulnerability: The Directory Traversal Comedy of Errors
Xorux LPAR2RRD’s file upload feature takes a wrong turn with a directory traversal vulnerability. A read-only user can upload files and alter paths to overwrite existing PERL modules, paving the way for remote code execution. Update to version 8.05 for a safer ride!

Hot Take:
When life gives you directories, don’t traverse them with malicious intent! The latest vulnerability in Xorux LPAR2RRD is a lesson in what happens when you let read-only users get a little too adventurous with file paths. It’s like giving your grandma a chainsaw for her birthday and hoping she only uses it to trim the hedges.
Key Points:
- Xorux LPAR2RRD version 8.04 and prior are vulnerable to directory traversal attacks.
- An authenticated read-only user can upload files to unauthorized locations, potentially executing remote code.
- The exploit involves altering the filename to trick the system into writing files to the desired path.
- Xorux has released version 8.05 to fix this exploit.
- Jim Becher of KoreLogic discovered and reported this vulnerability.
Already a member? Log in here