Lucene search

K
exploitdbJohn P. McNeelyEDB-ID:19842
HistoryApr 12, 2000 - 12:00 a.m.

TalentSoft Web+ 4.x - Directory Traversal

2000-04-1200:00:00
John P. McNeely
www.exploit-db.com
24

7.4 High

AI Score

Confidence

Low

0 Low

EPSS

Percentile

0.0%

source: https://www.securityfocus.com/bid/1102/info

Web+ is an e-commerce server designed to run under a webserver, to provide web storefronts. The various scripts that are required to do this are specified to the webpsvr daemon via a 'script' variable passed to the webplus CGI. This CGI can be passed a path to any file via the script variable, resulting in arbitrary files being displayed to the browser. This vulnerability is limited to files that are known to the user and that the webpsvr daemon has read access to.

http ://target/cgi-bin/webplus?script=/../../../../etc/passwd 

7.4 High

AI Score

Confidence

Low

0 Low

EPSS

Percentile

0.0%