Korean
<< Back
VID 21154
Severity 30
Port 80, ¡¦
Protocol TCP
Class CGI
Detailed Description The "web_store.cgi" CGI is installed. Extropia WebStore is an e-commerce shopping cart application consisting of routines for error handling, order processing, encrypted mailing, frames, Javascript and Vbscript.
Html_web_store.cgi and web_store.cgi CGI programs in eXtropia WebStore shopping cart program version 1.0 could allow a remote attacker to read arbitrary files via a .. (dot dot) attack on the page parameter. The scripts don't sufficiently restrict the $page variable from being used to open non-HTML files on the Web server. A remote attacker can bypass the file extension check by adding a null character (%00) to the URL, followed by the .html file extension to view non-HTML files. A remote attacker can send an HTTP GET request with "dot dot" sequences (/../) to traverse directories and gain read access to any files on the Web server with the privileges of the http daemon (usually root or nobody).
Recommendation Upgrade to the latest version of eXtropia WebStore (2.0 or later), available from the eXtropia Web site. (http://www.extropia.com/scripts/web_store.html)
Related URL CVE-2000-1005 (CVE)
Related URL 1774 (SecurityFocus)
Related URL 5347 (ISS)