5
CVSSv2

CVE-2001-0272

Published: 03/05/2001 Updated: 05/09/2008
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 505
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

Directory traversal vulnerability in sendtemp.pl in W3.org Anaya Web development server allows remote malicious users to read arbitrary files via a .. (dot dot) attack in the templ parameter.

Vulnerable Product Search on Vulmon Subscribe to Product

w3.org sendtemp.pl

Exploits

#!/usr/bin/perl -w # sendtemppl: A part of the Amaya Web development # server contains a file disclosure vulnerability, # which allows remote, read access to files # on the servers file system, as whichever # user the httpd is running as # # The Vulnerability is really quite simple # When the `templ` argument is past to # sendtemppl it a ...