Korean
<< Back
VID 21196
Severity 30
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The "sendtemp.pl" CGI is installed. The sendtemp.pl Perl script, developed by W3.org, is part of the Amaya Web development server.
Anyway, Sendtemp.pl could allow a remote attacker to traverse directories on the Web server, due to insufficient checks performed on parameters passed to sendtemp.pl through the "templ" argument. A remote attacker can send an HTTP GET request with "dot dot" sequences (/../) to traverse directories and gain read access to sensitive files on the Web server with the privileges of the http daemon (usually root or nobody).
Recommendation No remedy available as of June 2014. Remove it from /cgi-bin.
Related URL CVE-2001-0272 (CVE)
Related URL (SecurityFocus)
Related URL 6104 (ISS)