header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Bytes Interactive Web Shopper Path Traversal Vulnerability

Bytes Interactive Web Shopper is a XML based shopping cart application. The 'newpage' variable does not properly check for insecure relative paths such as the double dot '..'. The following URL request: http://target/cgi-bin/shopper.cgi?newpage=../../../path/filename.ext will yield the file specified. Successful exploitation could lead to a remote intruder gaining read access to any known file.

Extropia WebStore File Access Vulnerability

Extropia WebStore is an e-commerce shopping cart application consisting of routines for error handling, order processing, encrypted mailing, frames, Javascript and VBscript. The routine web_store.cgi does not properly handle the $file_extension variable if null characters are used. For example if the following URL was requested, the file in question would not be delivered to the user: http://target/cgi-bin/Web_Store/web_store.cgi?page=../../../path/filename.ext However, by using the escaped character “%00”, the requested file would be accessed successfully: http://target/cgi-bin/Web_Store/web_store.cgi?page=../../../path/filename%00ext Successful exploitation could lead to a remote intruder gaining read access to any known file.

PHPix Arbitrary File Access Vulnerability

PHPix is a web-based photo-album system written in PHP. It is vulnerable to an attack that allows a malicious remote user to view arbitrary files on the target webserver with the privileges of the webserver. The problem is that '../' character sequences can be supplied by the user in an http variable that is used to reference a file on the webservers filesystem. As a result, the attacker can construct a path relative to the current working directory of the webserver using '../'s and then the target filename/path to read any readable (to the uid of the httpd process) file on the filesystem. The information gained may make it easier to compromise the system in other ways.

Netscape’s iPlanet iCal Vulnerability

Netscape's iPlanet iCal application is a network based calendar service built for deployment in organizations which require a centralized calendar system. Certain versions of iCal ship with a vulnerability in /opt/SUNWicsrv/cal/bin/csstart program. This program is designed to launch the 'cshttpd' server which is the web based interface for the iCal product. The problem lies in that the 'csstart' program when run attempts by default to launch cshttpd out of the directory the user is in when they issue the command. Therefore, if a malicious user creates their own cshttpd in the directory from which they launch the csstart the fake server which be launched as opposed to the actual service. This rogue service is effectively launched as the user icsuser and allows the attacker to issue commands as such. Because this user ID owns the iCal directories and files the attacker may user to leverage the attack to root privileges.

Netscape’s iPlanet iCal Application Vulnerability

Netscape's iPlanet iCal application is a network based calendar service built for deployment in organizations which require a centralized calendar system. Certain versions of iCal ship with a vulnerability introduced in the installation process which will allow malicious local users to gain root on the system. During the installation process a large number of files are left world readable and writable. One such file, /opt/SUNWicsrv/cal/bin/iplncal.sh is designed to be run at startup as root and is world writable by default. This allows users to modify the contents of this startup script and have it executed at boot up time or whenever the machine is re-initialized.

Moreover.com ‘cached_feed’ CGI Script File Disclosure Vulnerability

The 'cached_feed' CGI script supplied by newsfeed vendor Moreover.com contains a file-disclosure vulnerability. The script's 'obtain_file' function, designed to return the contents of a specified file for display in the browser, fails to adequately filter ".." character sequences in user-supplied input. As a result, a carefully formed URL that is submitted to the script can result in the disclosure of files (readable by HTTP user) outside of the CGI script's "allowed" area.

Apache Web Server and MessageMedia UnityMail Denial of Service Vulnerability

Apache Web Server and MessageMedia UnityMail are susceptible to a denial of service attack if a significant amount of 8000 byte MIME headers are sent. Both will crash and restart of the application is required in order to regain normal functionality. Other web servers may be also be vulnerable to this attack.

OpenBSD kernel-panic DoS

OpenBSD is vulnerable to a remotely exploitable denial of service condition. The problem seems to be a lack of limits on the storage of pending arp requests, and a failure to handle the condition of too many. If an attacker somehow causes a victim machine to send out too many arp requests, it can cause a kernel panic and the target system to halt. An attacker can send spoofed packets with addresses of hosts within the victim's network, which will cause the kernel to panic with the message 'out of space in kmem_map' and freeze.

Recent Exploits: