| VID |
21196 |
| Severity |
30 |
| Port |
80, ... |
| Protocol |
TCP |
| Class |
CGI |
| Detailed Description |
The "sendtemp.pl" CGI is installed. The sendtemp.pl Perl script, developed by W3.org, is part of the Amaya Web development server. Anyway, Sendtemp.pl could allow a remote attacker to traverse directories on the Web server, due to insufficient checks performed on parameters passed to sendtemp.pl through the "templ" argument. A remote attacker can send an HTTP GET request with "dot dot" sequences (/../) to traverse directories and gain read access to sensitive files on the Web server with the privileges of the http daemon (usually root or nobody). |
| Recommendation |
No remedy available as of June 2014. Remove it from /cgi-bin. |
| Related URL |
CVE-2001-0272 (CVE) |
| Related URL |
(SecurityFocus) |
| Related URL |
6104 (ISS) |
|