darryl burgdorf weblibs 1.0 - Directory Traversal
Author: John Bissell type: webapps platform: php port: date_added: 2004-12-07 date_updated: 2013-03-15 verified: 1 codes: CVE-2004-1221;OSVDB-12273 tags: aliases: screenshot_url: application_url: raw file: 24806.txt
source: https://www.securityfocus.com/bid/11848/info It is reported that WebLibs is prone to a remote directory traversal vulnerability. This issue is due to a failure of the application to properly filter user-supplied input. WebLibs 1.0 is affected by this vulnerability. The following proof of concept is available: <INPUT type=hidden value="/../../../../../etc/passwd" name="TextFile">