HTTP: eXtropia WebStore Directory Traversal

This signature detects directory traversal attempts that exploit the Web_store.cgi script vulnerability in Extropia. Attackers can access arbitrary files on the Web server.

Extended Description

Extropia WebStore is an e-commerce shopping cart application consisting of routines for error handling, order processing, encrypted mailing, frames, Javascript and VBscript. The routine web_store.cgi does not properly handle the $file_extension variable if null characters are used. For example if the following URL was requested, the file in question would not be delivered to the user: http://target/cgi-bin/Web_Store/web_store.cgi?page=../../../path/filename.ext However, by using the escaped character "%00", the requested file would be accessed successfully: http://target/cgi-bin/Web_Store/web_store.cgi?page=../../../path/filename%00ext Successful exploitation could lead to a remote intruder gaining read access to any known file.

Affected Products

Extropia webstore

References

BugTraq: 1774

CVE: CVE-2000-1005

Short Name
HTTP:CGI:EXTROPIA-DIR-TRAVERSAL
Severity
Warning
Recommended
False
Recommended Action
None
Category
HTTP
Keywords
CVE-2000-1005 Directory Traversal WebStore bid:1774 eXtropia
Release Date
04/22/2003
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3336
False Positive
Unknown
Vendors

Extropia

CVSS Score

5.0

Found a potential security threat?