source: http://www.securityfocus.com/bid/1776/info Bytes Interactive Web Shopper is a XML based shopping cart application. The "newpage" variable does not properly check for insecure relative paths such as the double dot "..". The following URL request: http://target/cgi-bin/shopper.cgi?newpage=../../../path/filename.ext will yield the file specified. Successful exploitation could lead to a remote intruder gaining read access to any known file.
Related ExploitsTrying to match CVEs (1): CVE-2000-0922
Trying to match OSVDBs (1): 432
Other Possible E-DB Search Terms: bytes interactive Web shopper 1.0/2.0, bytes interactive Web shopper