escripts software e_board 4.0 - Directory Traversal
Author: white_e@nogimmick.org
type: webapps
platform: cgi
port:
date_added: 2004-12-20
date_updated: 2013-04-27
verified: 1
codes: OSVDB-53699
tags:
aliases:
screenshot_url:
application_url:
source: https://www.securityfocus.com/bid/12048/info
It is reported that e_Board is vulnerable to a directory traversal vulnerability. This issue is due to a failure of the application to properly sanitize user-supplied input.
By including '../' directory traversal sequences and a NULL (%00) in the affected URI argument, attackers may reportedly cause the contents of arbitrary, potentially sensitive web-server readable files to be included in the output of the requested page.
http://www.example.com/cgi-bin/eboard40/index2.cgi?frames=yes&board=demo&mode=Current&threads=Collapse&message=../../../../../../../../../../../etc/passwd%00