vendor:
Amaya Web development server
by:
Tom Parker (tom@rooted.net)
5.5
CVSS
MEDIUM
File Disclosure
22
CWE
Product Name: Amaya Web development server
Affected Version From: Unknown
Affected Version To: Unknown
Patch Exists: NO
Related CWE:
CPE:
Platforms Tested: Unknown
Unknown
sendtemp.pl File Disclosure Vulnerability
A vulnerability in the Amaya Web development server allows remote read access to files on the server's file system. By passing a malicious `templ` argument to the sendtemp.pl script, an attacker can traverse the file system and read files, such as the passwd file. This vulnerability occurs due to lack of input sanitization on the `templ` parameter.
Mitigation:
Implement proper input sanitization on the `templ` parameter to prevent directory traversal attacks. Additionally, consider running the http daemon under chroot() to further restrict access to the file system.