|
Vulnerability Clipper Affected Anaconda Clipper 3.3 (probably others) Description Following is based on a UkR security team Advisory no. 11. '..' and '/' are not filtered while processing user input, so it is possible to enter arbitrary values to retreive files from remote sever, which should not be accessible normally (for ex., /etc/passwd). Example: http://blah.somenonexistanthost.com/cgi-bin/anacondaclip.pl?template=../../../../../../../../../../../../../../../../../../etc/passwd Solution This will help in somewhat: $input =~ s/[(\.\.)|\/]//g;