Korean
<< Back
VID 21523
Severity 30
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The Web server has a CGI file vulnerable to a file disclosure vulnerability. The relevant CGI could allow a remote attacker to traverse directories on the Web server, caused by a failure of the application to properly validate user-supplied input caused by improper validation of user-supplied input in a specific parameter in the CGI. By sending a specially-crafted URL containing "dot dot" sequences (/../, \..\, or %2F%2E%2E%2F) in the affected parameter, a remote attacker could traverse directories and read files on the Web server.

* Platforms Affected:
Any HTTP server Any version
Any operating system Any version
Recommendation Modify the affected CGI script to perform proper validation of user-supplied input passed to a specific parameter in the CGI. For details, please see the CERT Web site at http://stuff.mit.edu/afs/athena/astaff/reference/cert/Tips/cgi_metacharacters
Related URL (CVE)
Related URL (SecurityFocus)
Related URL (ISS)