extropia webstore 1.0/2.0 - Directory Traversal Vulnerability

ID EDB-ID:20279
Type exploitdb
Reporter f0bic
Modified 2000-10-09T00:00:00


Extropia WebStore 1.0/2.0 Directory Traversal Vulnerability. CVE-2000-1005. Remote exploit for cgi platform

                                            source: http://www.securityfocus.com/bid/1774/info

Extropia WebStore is an e-commerce shopping cart application consisting of routines for error handling, order processing, encrypted mailing, frames, Javascript and VBscript.

The routine web_store.cgi does not properly handle the $file_extension variable if null characters are used.

For example if the following URL was requested, the file in question would not be delivered to the user:


However, by using the escaped character "%00", the requested file would be accessed successfully:


Successful exploitation could lead to a remote intruder gaining read access to any known file.