Bytes Interactive Web Shopper Directory Traversal Vulnerability

Bytes Interactive Web Shopper is a XML based shopping cart application.

The "newpage" variable does not properly check for insecure relative paths such as the double dot "..".

The following URL request:

http://target/cgi-bin/shopper.cgi?newpage=../../../path/filename.ext

will yield the file specified.

Successful exploitation could lead to a remote intruder gaining read access to any known file.


 

Privacy Statement
Copyright 2010, SecurityFocus