8 lines
No EOL
741 B
Text
8 lines
No EOL
741 B
Text
source: https://www.securityfocus.com/bid/1762/info
|
|
|
|
|
|
The 'cached_feed' CGI script supplied by newsfeed vendor Moreover.com contains a file-disclosure vulnerability. The script's 'obtain_file' function, designed to return the contents of a specified file for display in the browser, fails to adequately filter ".." character sequences in user-supplied input. As a result, a carefully formed URL that is submitted to the script can result in the disclosure of files (readable by HTTP user) outside of the CGI script's "allowed" area.
|
|
|
|
Version 1.0 of the product is affected. The vendor repaired the script and released version 2.0 before this vulnerability was published.
|
|
|
|
http://www.example.com/cgi-bin/cached_feed.cgi?../../../.+/etc/passwd |