exploit-db-mirror/exploits/cgi/remote/20623.txt
Offensive Security b4c96a5864 DB: 2021-09-03
28807 changes to exploits/shellcodes
2021-09-03 20:19:21 +00:00

5 lines
No EOL
410 B
Text

source: https://www.securityfocus.com/bid/2361/info
It is possible for a remote user to gain read access to directories and files outside the root directory of Carey Internet Services Commerce.cgi. Requesting a specially crafted URL composed of '/../%00' along with the known filename or directory will disclose the requested resource.
http://target/cgi/commerce.cgipage=../../../../etc/hosts%00filename.html