HTTP: Hassan Consulting Shopping Cart Directory Traversal
This signature detects attempts to exploit a vulnerability in the Hassan shopping cart script shop.cgi. Attackers can access arbitrary system files.
Extended Description
The $page variable in Hassan Consulting Shopping Cart does not properly check for insecure relative paths such as the double dot "..". Therefore, requesting the following URL will display the specified file: http://target/cgi-bin/shop.cgi/page=../../../path/filename.ext Successful exploitation could lead to a remote intruder gaining read access to any known file.
Affected Products
Hassan_consulting shopping_cart
srx-branch-12.3
srx-19.3
srx-branch-19.3
vsrx3bsd-19.2
srx-branch-19.4
vsrx-19.4
mx-12.3
mx-19.4
vmx-19.4
mx-19.3
vsrx3bsd-19.4
srx-19.4
vsrx-12.3
vmx-19.3
vsrx-19.2
srx-12.3
Hassan_consulting
5.0