Lucene search

K
exploitdbJohn P. McNeelyEDB-ID:19842
HistoryApr 12, 2000 - 12:00 a.m.

TalentSoft Web+ 4.x - Directory Traversal

2000-04-1200:00:00
John P. McNeely
www.exploit-db.com
26

AI Score

7.4

Confidence

Low

source: https://www.securityfocus.com/bid/1102/info

Web+ is an e-commerce server designed to run under a webserver, to provide web storefronts. The various scripts that are required to do this are specified to the webpsvr daemon via a 'script' variable passed to the webplus CGI. This CGI can be passed a path to any file via the script variable, resulting in arbitrary files being displayed to the browser. This vulnerability is limited to files that are known to the user and that the webpsvr daemon has read access to.

http ://target/cgi-bin/webplus?script=/../../../../etc/passwd 

AI Score

7.4

Confidence

Low