Description
loadpage.cgi CGI program in EZshopper 3.0 and 2.0 allows remote attackers to list and read files in the EZshopper data directory by inserting a "/" in front of the target filename in the "file" parameter.
Exploits (1)
exploitdb
WRITEUP
VERIFIED
by Nsfocus · textremotemultiple
https://www.exploit-db.com/exploits/20507
References (3)
Core 3
Core References
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/5740
Exploit, Vendor Advisory vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/2109
Mailing List mailing-list
x_refsource_bugtraq
http://marc.info/?l=bugtraq&m=97676270729984&w=2
Scores
EPSS
0.0409
EPSS Percentile
88.6%
Details
Status
published
Products (2)
alex_heiphetz_group/ezshopper
2.0
alex_heiphetz_group/ezshopper
3.0
Published
Jan 09, 2001
Tracked Since
Feb 18, 2026