HTTP: Store.cgi Attempt
This signature detects attempts to exploit a directory traversal vulnerability in the store.cgi script. Attackers can view arbitrary files on the system.
Extended Description
It is possible for a remote user to gain read access to directories and files outside the root directory of ES.One. Requesting a specially crafted URL by way of 'store.cgi', composed of '/../' sequences and appended with '%00' will disclose an arbitrary directory.
Affected Products
Thinking_arts es.one
References
BugTraq: 2385
CVE: CVE-2001-0305
URL: http://packetstorm.linuxsecurity.com/0108-exploits/store.cgi.txt
srx-branch-12.3
srx-19.3
srx-branch-19.3
vsrx3bsd-19.2
srx-branch-19.4
vsrx-19.4
mx-12.3
mx-19.4
vmx-19.4
mx-19.3
vsrx3bsd-19.4
srx-19.4
vsrx-12.3
vmx-19.3
vsrx-19.2
srx-12.3
Thinking_arts
5.0