iSoft-Solutions QuikStore Shopping Cart 2.12 – ‘template’ Directory Traversal

iSoft-Solutions QuikStore Shopping Cart 2.12 – ‘template’ Directory Traversal

漏洞ID 1054326 漏洞类型
发布时间 2003-12-23 更新时间 2003-12-23
图片[1]-iSoft-Solutions QuikStore Shopping Cart 2.12 – ‘template’ Directory Traversal-安全小百科CVE编号 N/A
图片[2]-iSoft-Solutions QuikStore Shopping Cart 2.12 – ‘template’ Directory Traversal-安全小百科CNNVD-ID N/A
漏洞平台 CGI CVSS评分 N/A
|漏洞来源
https://www.exploit-db.com/exploits/23467
|漏洞详情
漏洞细节尚未披露
|漏洞EXP
source: http://www.securityfocus.com/bid/9283/info

It has been reported that QuikStore Shopping Cart may be prone to a directory traversal vulnerability that may allow an attacker to traverse outside the server root directory by using '../' character sequences. The issue exists due to insufficient sanitization of user-supplied data through the 'template' parameter of the 'quikstore.cgi' script. This issue may also allow an attacker to carry out remote command execution by executing the vulnerable script and including malicious shell metacharacters and commands as a value for the 'template' parameter.

Specific vulnerable versions of the software were not identified in the report; therefore it is being assumed that the current version QuikStore Shopping Cart v2.12 is vulnerable to this issue. 

http://www.example.com/quikstore.cgi?category=blah&template=../../../../../../../../../../etc/passwd%00.html
http://www.example.com/quikstore.cgi?category=blah&template=../../../../../../../../../../../../etc/hosts
http://www.example.com/quikstore.cgi?category=blah&template=../../../../../../../../../../../../usr/bin/id|

相关推荐: Monkey HTTP Daemon 0.4/0.5/0.6 – Excessive POST Data Buffer Overflow

Monkey HTTP Daemon 0.4/0.5/0.6 – Excessive POST Data Buffer Overflow 漏洞ID 1053782 漏洞类型 发布时间 2003-03-24 更新时间 2003-03-24 CVE编号 N/A C…

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享