Bytes interactive Web shopper 1.0/2.0 - Directory Traversal
Author: f0bic
type: remote
platform: cgi
port:
date_added: 2000-10-08
date_updated: 2016-11-25
verified: 1
codes: CVE-2000-0922;OSVDB-432
tags:
aliases:
screenshot_url:
application_url:
source: https://www.securityfocus.com/bid/1776/info
Bytes Interactive Web Shopper is a XML based shopping cart application.
The "newpage" variable does not properly check for insecure relative paths such as the double dot "..".
The following URL request:
http://target/cgi-bin/shopper.cgi?newpage=../../../path/filename.ext
will yield the file specified.
Successful exploitation could lead to a remote intruder gaining read access to any known file.