CGI Script Center Auction Weaver Username / Bidfile Directory Traversal Vulnerability
BID:1783
Info
CGI Script Center Auction Weaver Username / Bidfile Directory Traversal Vulnerability
| Bugtraq ID: | 1783 |
| Class: | Access Validation Error |
| CVE: | |
| Remote: | Yes |
| Local: | Yes |
| Published: | Oct 12 2000 12:00AM |
| Updated: | Oct 12 2000 12:00AM |
| Credit: | Discovered by Steve Christey <[email protected]> on October 12, 2000. |
| Vulnerable: |
CGI Script Center Auction Weaver 1.0 4 CGI Script Center Auction Weaver 1.0 3 CGI Script Center Auction Weaver 1.0 2 CGI Script Center Auction Weaver 1.0 1 CGI Script Center Auction Weaver 1.0 |
| Not Vulnerable: |
CGI Script Center Auction Weaver 1.0 5 |
Discussion
CGI Script Center Auction Weaver Username / Bidfile Directory Traversal Vulnerability
It is possible for a remote user without any proper credentials to view the contents of any known file residing on a system running CGI Script Center Auction Weaver. The form fields username and bidfile used in conjunction with null characters can be used to gain read access to arbitrary files by utilizing the double dot ".." method.
It is possible for a remote user without any proper credentials to view the contents of any known file residing on a system running CGI Script Center Auction Weaver. The form fields username and bidfile used in conjunction with null characters can be used to gain read access to arbitrary files by utilizing the double dot ".." method.
Exploit / POC
CGI Script Center Auction Weaver Username / Bidfile Directory Traversal Vulnerability
Currently the SecurityFocus staff are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: [email protected].
Currently the SecurityFocus staff are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: [email protected].
Solution / Fix
CGI Script Center Auction Weaver Username / Bidfile Directory Traversal Vulnerability
Solution:
CGI Script Center has addressed this vulnerability with the release of Auction Weaver 1.05. It is available for download at the following location:
http://www.cgiscriptcenter.com/awl/
Solution:
CGI Script Center has addressed this vulnerability with the release of Auction Weaver 1.05. It is available for download at the following location:
http://www.cgiscriptcenter.com/awl/
References
CGI Script Center Auction Weaver Username / Bidfile Directory Traversal Vulnerability
References:
References:
- Auction Weaver Product Homepage (CGI Script Center)