[19259] in bugtraq

home help back first fref pref prev next nref lref last post

Thinking Arts Store.cgi Directory Traversal

daemon@ATHENA.MIT.EDU (slipy@B10Z.NET)
Fri Feb 16 13:08:53 2001

Message-Id:  <20010216071401.16151.qmail@securityfocus.com>
Date:         Fri, 16 Feb 2001 07:14:01 -0000
Reply-To: slipy@B10Z.NET
From: slipy@B10Z.NET
To: BUGTRAQ@SECURITYFOCUS.COM

Introduction:

Thinking Arts LTD E-Commerce package comes 
with a webstore frontend called store.cgi which 
allows people to basically order products on their 
website over a SQL database. 


The vendors website is:
http://www.thinkingarts.com/  


Problem: Simple Directory Traversal

Adding the string "/../" to an URL allows an attacker to 
view any file on the server, and also list directories 
within the server which the owner of the vulnerable 
httpd has permissions to access. Remote execution 
of commands does not apear to be possible with this 
directory traversal bug, but directory listings are. 
Please note that you do need the %00.html at the end 
of your command.


Examples:

http://www.VULNERABLE.com/cgi-bin/store.cgi?
StartID=../etc/hosts%00.html
^^ = Will obviously open the hosts file. 

http://www.VULNERABLE.com/cgi-bin/store.cgi?
StartID=../etc/%00.html
^^ = Will obviously list the /etc/ directory. 



Solution:

Vendor has been contacted. No reply from them yet, 
and seeing only 3 sites who signed up for their dumb 
service are affected, so it doesn't really matter now 
does it?


--------------------
b10z cgi advisory.
slipy@b10z.net

February 16th, 2001.

home help back first fref pref prev next nref lref last post