13 lines
No EOL
455 B
Text
13 lines
No EOL
455 B
Text
source: https://www.securityfocus.com/bid/1776/info
|
|
|
|
Bytes Interactive Web Shopper is a XML based shopping cart application.
|
|
|
|
The "newpage" variable does not properly check for insecure relative paths such as the double dot "..".
|
|
|
|
The following URL request:
|
|
|
|
http://target/cgi-bin/shopper.cgi?newpage=../../../path/filename.ext
|
|
|
|
will yield the file specified.
|
|
|
|
Successful exploitation could lead to a remote intruder gaining read access to any known file. |