Interactive story 1.3 - Directory Traversal
Author: qDefense
type: remote
platform: cgi
port:
date_added: 2001-07-15
date_updated: 2016-11-25
verified: 1
codes: CVE-2001-0804;OSVDB-683
tags:
aliases:
screenshot_url:
application_url:
source: https://www.securityfocus.com/bid/3028/info
Interactive Story is a web-based application written in Perl and is distributed as freeware.
Interactive Story does not filter '../' sequences from user input submitted to a hidden file called 'next'. Remote attackers may take advantage of this by crafting URLs that allow them to break out of webroot and view arbitrary web-readable files.
The disclosed information may be used in further attacks on the host.
If an attacker sets the "next" field to something like
../../../../../../../../../../etc/passwd%00, Interactive Story will open and display the password file.