Overview
Mike Spice's Quiz Me! does not adequately validate user input, allowing directory traversal. As a result, an attacker can cause Quiz Me! to overwrite any file on the server to which the web server process has write privileges.
Description
Mike Spice's Quiz Me! is a CGI script written in Perl, enabling webmasters to publish interactive quizzes on their sites. The CGI variable 'quiz' is passed by Quiz Me! to Perl's open() function, without adequate validation to filter '../' sequences and null bytes. As a result, an attacker can cause Quiz Me! to traverse directories and overwrite any file on the server to which the web server process has write privileges. |
Impact
Remote attackers can overwrite files on the server. |
Solution
Upgrade Upgrade to version 0.6 or later of Quiz Me!: |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
Acknowledgements
Thanks to Mike Spice for reporting this vulnerability.
This document was written by Shawn Van Ittersum.
Other Information
CVE IDs: | None |
Severity Metric: | 3.42 |
Date Public: | 2002-01-10 |
Date First Published: | 2002-09-18 |
Date Last Updated: | 2002-09-18 14:08 UTC |
Document Revision: | 6 |