[] NeoSense

Interactive story 1.3 - Directory Traversal

Author: qDefense
type: remote
platform: cgi
port: 
date_added: 2001-07-15 
date_updated: 2016-11-25 
verified: 1 
codes: CVE-2001-0804;OSVDB-683 
tags: 
aliases:  
screenshot_url:  
application_url: 

source: https://www.securityfocus.com/bid/3028/info

Interactive Story is a web-based application written in Perl and is distributed as freeware.

Interactive Story does not filter '../' sequences from user input submitted to a hidden file called 'next'. Remote attackers may take advantage of this by crafting URLs that allow them to break out of webroot and view arbitrary web-readable files.

The disclosed information may be used in further attacks on the host.

If an attacker sets the "next" field to something like
../../../../../../../../../../etc/passwd%00, Interactive Story will open and display the password file.