header-logo
Suggest Exploit
vendor:
Poll It
by:
SecurityFocus
7.5
CVSS
HIGH
Variable Overwriting
20
CWE
Product Name: Poll It
Affected Version From: Poll It SSI v2.0
Affected Version To: Poll It SSI v2.0
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2002

Poll It CGI Application Vulnerability

Poll It is a Perl CGI application used to create and maintain opinion polls on websites. The program relies on a number of internal variables. These variables can be overwritten by any remote user by specifying the new value as a variable in the GET request. This is due to the fact that Poll It overwrites variables to user-supplied values after it sets them to the internally-specified defaults. This can lead to unauthorized file reads, as well as potentially other compromises.

Mitigation:

Ensure that user-supplied input is properly validated and sanitized before being used.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/1431/info

Poll It is a Perl CGI application used to create and maintain opinion polls on websites. The program relies on a number of internal variables. These variables can be overwritten by any remote user by specifying the new value as a variable in the GET request. This is due to the fact that Poll It overwrites variables to user-supplied values after it sets them to the internally-specified defaults.

This can lead to unauthorized file reads, as well as potentially other compromises. 

http: //target/cgi-bin/pollit/Poll_It_SSI_v2.0.cgi?data_dir=/etc/passwd%00