Cart32 3.0 - 'expdate' Administrative Information Disclosure
Author: cassius
type: remote
platform: windows
port:
date_added: 2000-05-03
date_updated: 2012-07-22
verified: 1
codes: CVE-2000-0430;OSVDB-1404
tags:
aliases:
screenshot_url:
application_url:
source: https://www.securityfocus.com/bid/1358/info
By appending the string "/expdate" to a request for the cart32.exe executable, (http: //target/cgi-bin/cart32.exe/expdate) an attacker can access an error message followed by a debugging page containing the server variables, the Cart32 administration directory and possibly the contents of the cgi-bin.
http: //target/cgi-bin/cart32.exe/expdate