Overview
zml.cgi does not adequately validate user input, allowing for directory traversal out of the web root directory.
Description
The perl script zml.cgi reads and parses a file on the server, executing certain Server Side Include (SSI) directives found in the file. The script accepts a CGI parameter specifying the file that should be read and parsed. The script does not adequately validate this parameter, allowing for directory traversal out of the web root directory. |
Impact
Attackers may read any file readable by the web server process. |
Solution
The CERT/CC is currently unaware of a practical solution to this problem. |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
Acknowledgements
Thanks to Blackshell Security Advisory for reporting this vulnerability.
This document was written by Shawn Van Ittersum.
Other Information
CVE IDs: | CVE-2001-1209 |
Severity Metric: | 1.71 |
Date Public: | 2001-12-31 |
Date First Published: | 2002-09-26 |
Date Last Updated: | 2002-09-26 22:02 UTC |
Document Revision: | 6 |