exploit-db-mirror/platforms/cgi/remote/21008.txt
Offensive Security fffbf04102 Updated
2013-12-03 19:44:07 +00:00

10 lines
No EOL
635 B
Text
Executable file

source: http://www.securityfocus.com/bid/3028/info
Interactive Story is a web-based application written in Perl and is distributed as freeware.
Interactive Story does not filter '../' sequences from user input submitted to a hidden file called 'next'. Remote attackers may take advantage of this by crafting URLs that allow them to break out of webroot and view arbitrary web-readable files.
The disclosed information may be used in further attacks on the host.
If an attacker sets the "next" field to something like
../../../../../../../../../../etc/passwd%00, Interactive Story will open and display the password file.