Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-xg7x-r7p4-phg6

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

c32web.exe in McMurtrey/Whitaker Cart32 before 6.4 allows remote attackers to read arbitrary files via the ImageName parameter in a GetImage action, by appending a NULL byte (%00) sequence followed by an image file extension, as demonstrated by a request for a ".txt%00.gif" file. NOTE: this might be a directory traversal vulnerability.

c32web.exe in McMurtrey/Whitaker Cart32 before 6.4 allows remote attackers to read arbitrary files via the ImageName parameter in a GetImage action, by appending a NULL byte (%00) sequence followed by an image file extension, as demonstrated by a request for a ".txt%00.gif" file. NOTE: this might be a directory traversal vulnerability.

EPSS

Процентиль: 93%
0.10252
Средний

Дефекты

CWE-20

Связанные уязвимости

nvd
больше 18 лет назад

c32web.exe in McMurtrey/Whitaker Cart32 before 6.4 allows remote attackers to read arbitrary files via the ImageName parameter in a GetImage action, by appending a NULL byte (%00) sequence followed by an image file extension, as demonstrated by a request for a ".txt%00.gif" file. NOTE: this might be a directory traversal vulnerability.

EPSS

Процентиль: 93%
0.10252
Средний

Дефекты

CWE-20