EditTag CGI encoded "dot dot" directory traversal
|edittag-dotdot-directory-traversal (11159)||Medium Risk|
EditTag could allow a remote attacker to traverse directories on the Web server. A remote attacker could send a specially-crafted URL request to the edittag.cgi script containing URL encoded "dot dot" sequences (%F..%F) in the "file" parameter to traverse directories and obtain any known file on the Web server.
No remedy available as of June 1, 2013.
- BugTraq Mailing List, Fri Jan 24 2003 - 00:33:08 CST : Vulnerability in edittag.pl .
- EditTag Web site: EditTag.
- BID-6675: EditTag edittag.pl File Disclosure Vulnerability
- CVE-2003-1351: Directory traversal vulnerability in edittag.cgi in EditTag 1.1 allows remote attackers to read arbitrary files via a %2F.. (encoded slash dot dot) in the file parameter.
- OSVDB ID: 56290: EditTag edittag.cgi file Parameter Encoded Traversal Arbitrary File Access
- Greg Billock EditTag 1.1
Jan 24, 2003
The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the author/distributor (IBM Internet Security Systems X-Force) be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.
For corrections or additions please email ignore thisxforceignore this@ignore thisus.ignore thisibm.comignore this