Description: Bug in Poll_It_SSI_v2.0.cgi reveals info.
Compromise: Accessing files that arn't in the web-dir.
Vulnerable Systems: Pollit v2.0 (only tested version).
Details:
When you run the Pollit CGI script ALL your world readable files could
be accessed by any web user, for example your /etc/passwd file could be
opened to get valid usernames and maybe passwords.
How to exploit this bug?
Simply request
http://www.targethost.com/pollit/Poll_It_v2.0.cgi?data_dir=\etc\passwd%00
and the passwd file is presented in your browser.
Files that are world readable could be accessed.
Solution:
I'am not aware of any solution probably debuging or removeing the script
is the best solution.
BR,
Jan van de Rijt aka The Warlock.