Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
N/A
Vulnerability Description
Directory traversal vulnerability in r.pl (aka r.cgi) of Randy Parker Power Up HTML 0.8033beta allows remote attackers to read arbitrary files and possibly execute arbitrary code via a .. (dot dot) in the FILE parameter.
CVSS Information
N/A
Vulnerability Type
N/A
Vulnerability Title
Power Up HTML 目录遍历导致文件泄漏或代码执行
Vulnerability Description
CVE(CAN) ID: CAN-2001-1138 Power Up HTML是一系列类似HTML的命令,它们可以放在web页面中扩展HTML编程的能力。 然而Power Up HTML所包含的一个CGI程序r.cgi存在一个目录遍历漏洞,它没有检查用户 输入数据中是否包含"../"或者shell元字符等特殊字符,就将将其交给了一个open调用。 这导致攻击者可以以web服务器运行权限查看任意文件以及执行任意命令。 有问题的部分在下列代码中: if ( open(FILE, "$in{BFDIR}/$i
CVSS Information
N/A
Vulnerability Type
N/A