source: http://www.securityfocus.com/bid/1777/info The $page variable in Hassan Consulting Shopping Cart does not properly check for insecure relative paths such as the double dot "..". Therefore, requesting the following URL will display the specified file: http://target/cgi-bin/shop.cgi/page=../../../path/filename.ext Successful exploitation could lead to a remote intruder gaining read access to any known file.
Related ExploitsTrying to match CVEs (1): CVE-2000-0921
Trying to match OSVDBs (1): 1596
Other Possible E-DB Search Terms: hassan Consulting shopping cart 1.18, hassan Consulting shopping cart
|2001-09-08||21104||Hassan Consulting Shopping Cart 1.23 - Arbitrary Command Execution||Alexey Sintsov|