exploit-db-mirror/exploits/cgi/remote/20280.txt
Offensive Security b4c96a5864 DB: 2021-09-03
28807 changes to exploits/shellcodes
2021-09-03 20:19:21 +00:00

13 lines
No EOL
455 B
Text

source: https://www.securityfocus.com/bid/1776/info
Bytes Interactive Web Shopper is a XML based shopping cart application.
The "newpage" variable does not properly check for insecure relative paths such as the double dot "..".
The following URL request:
http://target/cgi-bin/shopper.cgi?newpage=../../../path/filename.ext
will yield the file specified.
Successful exploitation could lead to a remote intruder gaining read access to any known file.