header-logo
Suggest Exploit
vendor:
Web+
by:
SecurityFocus
3.3
CVSS
MEDIUM
Arbitrary File Disclosure
200
CWE
Product Name: Web+
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: N/A
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2001

Web+ Arbitrary File Disclosure Vulnerability

Web+ is an e-commerce server designed to run under a webserver, to provide web storefronts. The various scripts that are required to do this are specified to the webpsvr daemon via a 'script' variable passed to the webplus CGI. This CGI can be passed a path to any file via the script variable, resulting in arbitrary files being displayed to the browser. This vulnerability is limited to files that are known to the user and that the webpsvr daemon has read access to.

Mitigation:

Ensure that the webpsvr daemon does not have read access to any sensitive files.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/1102/info

Web+ is an e-commerce server designed to run under a webserver, to provide web storefronts. The various scripts that are required to do this are specified to the webpsvr daemon via a 'script' variable passed to the webplus CGI. This CGI can be passed a path to any file via the script variable, resulting in arbitrary files being displayed to the browser. This vulnerability is limited to files that are known to the user and that the webpsvr daemon has read access to.

http ://target/cgi-bin/webplus?script=/../../../../etc/passwd