| VID |
21180 |
| Severity |
30 |
| Port |
80, ... |
| Protocol |
TCP |
| Class |
CGI |
| Detailed Description |
The Interactive Story program has a directory traversal vulnerability. Interactive Story is a web-based application written in Perl and is distributed as freeware. Directory traversal vulnerability in story.pl in Interactive Story 1.3 allows a remote attacker to read arbitrary files on the web server via a .. (dot dot) attack on the "next" parameter. If the attacker set the "next" field to something like: http://target/cgi-bin/story.pl?next=../../../../../../../../etc/passwd%00
Interactive Story will open and display the password file. |
| Recommendation |
Upgrade story.pl to Interactive Story version 1.4. |
| Related URL |
CVE-2001-0804 (CVE) |
| Related URL |
3028 (SecurityFocus) |
| Related URL |
6843 (ISS) |
|