Last Modified: Sept. 5, 2008
Matt Wright's download.cgi 1.0 allows remote attackers to read arbitrary files via a .. (dot dot) in the f parameter.
Access Vector: Network
Access Complexity: Low
Authentication: None
Confidentiality Impact: Partial
Integrity Impact: None
Availability Impact: None
Base Score: 5.0
Exploitability Score: 10.0
Impact Score: 2.9
CVSS V2: AV:N/AC:L/Au:N/C:P/I:N/A:N
NVD-CWE-Other
['alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS ( msg:"SERVER-WEBAPP Matt Wright download.cgi access"; flow:to_server,established; http_uri; content:"/download.cgi",fast_pattern,nocase; metadata:ruleset community; service:http; reference:bugtraq,4579; reference:cve,1999-1377; reference:nessus,11748; classtype:web-application-activity; sid:2201; rev:17; )\n', '# alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP Matt Wright download.cgi access"; flow:to_server,established; content:"/download.cgi"; fast_pattern:only; http_uri; metadata:ruleset community, service http; reference:bugtraq,4579; reference:cve,1999-1377; reference:nessus,11748; classtype:web-application-activity; sid:2201; rev:17;)\n']
Condition | Configuration | |
---|---|---|
OR | ||
OR | ||
cpe:2.3:a:matt_wright:download.cgi:1.0:*:*:*:*:*:*:* Part: a Vendor: matt_wright | Alle Schwachstellen für matt_wright |
<?xml version="1.0" ?> <set operator="and"> <set operator="or"> <prop key="application" value="cpe:2.3:a:matt_wright:download.cgi:1.0:*:*:*:*:*:*:*"/> </set> <prop key="program_influence" value="input"/> <prop key="range" value="remote"/> </set>
<?xml version="1.0" ?> <set operator="and"> <set operator="or"> <prop key="application" value="cpe:2.3:a:matt_wright:download.cgi:1.0:*:*:*:*:*:*:*"/> </set> <prop key="program_influence" value="input"/> <prop key="data" value="any"/> <prop key="data_influence" value="read"/> <prop key="range" value="remote"/> </set>