| VID |
21524 |
| Severity |
30 |
| Port |
80, ... |
| Protocol |
TCP |
| Class |
CGI |
| Detailed Description |
The Web server has a CGI file vulnerable to a directory listing vulnerability. The relevant CGI could allow a remote attacker to view directory listings for directories outside of the Web root, caused by a failure of the application to properly validate user-supplied input caused by improper validation of user-supplied input in a specific parameter in the CGI. By sending a specially-crafted URL containing "dot dot" sequences (/../, \..\, %2F..%2F, or %2F%2E%2E%2F) in the affected parameter, a remote attacker could traverse directories and obtain a directory listing of any directory on the Web server.
* Platforms Affected: Any HTTP server Any version Any operating system Any version |
| Recommendation |
Modify the affected CGI script to perform proper validation of user-supplied input passed to a specific parameter in the CGI. For details, please see the CERT Web site at http://stuff.mit.edu/afs/athena/astaff/reference/cert/Tips/cgi_metacharacters |
| Related URL |
(CVE) |
| Related URL |
(SecurityFocus) |
| Related URL |
(ISS) |
|