| VID |
21154 |
| Severity |
30 |
| Port |
80, ¡¦ |
| Protocol |
TCP |
| Class |
CGI |
| Detailed Description |
The "web_store.cgi" CGI is installed. Extropia WebStore is an e-commerce shopping cart application consisting of routines for error handling, order processing, encrypted mailing, frames, Javascript and Vbscript. Html_web_store.cgi and web_store.cgi CGI programs in eXtropia WebStore shopping cart program version 1.0 could allow a remote attacker to read arbitrary files via a .. (dot dot) attack on the page parameter. The scripts don't sufficiently restrict the $page variable from being used to open non-HTML files on the Web server. A remote attacker can bypass the file extension check by adding a null character (%00) to the URL, followed by the .html file extension to view non-HTML files. A remote attacker can send an HTTP GET request with "dot dot" sequences (/../) to traverse directories and gain read access to any files on the Web server with the privileges of the http daemon (usually root or nobody). |
| Recommendation |
Upgrade to the latest version of eXtropia WebStore (2.0 or later), available from the eXtropia Web site. (http://www.extropia.com/scripts/web_store.html) |
| Related URL |
CVE-2000-1005 (CVE) |
| Related URL |
1774 (SecurityFocus) |
| Related URL |
5347 (ISS) |
|