EPay Pro 2.0 - 'index.php' Directory Traversal

EDB-ID:

26272


Author:

h4cky0u

Type:

webapps


Platform:

PHP

Date:

2005-09-19


source: https://www.securityfocus.com/bid/14871/info

EPay Pro is prone to a directory traversal vulnerability. This is due to a lack of proper validation of user-supplied input.

An unauthorized user can retrieve arbitrary files by supplying directory traversal strings '../' to the vulnerable parameter. Exploitation of this vulnerability could lead to a loss of confidentiality. Information obtained may aid in further attacks against the underlying system; other attacks are also possible.

http://www.example.com/index.php?read=../../../../../../../../../../../../../../etc/passwd