Description
Directory traversal vulnerability in Wolfram Research webMathematica 1.0.0 and 1.0.0.1 allows remote attackers to read arbitrary files via a .. (dot dot) in the MSPStoreID parameter.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by Andrew Badr · textwebappsjava
https://www.exploit-db.com/exploits/21562
References (5)
Core 5
Core References
Exploit, Patch, Vendor Advisory vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/5035
Patch, Vendor Advisory vdb-entry
x_refsource_xf
http://www.iss.net/security_center/static/9373.php
US Government Resource third-party-advisory
x_refsource_cert-vn
http://www.kb.cert.org/vuls/id/664323
Third Party Advisory mailing-list
x_refsource_bugtraq
http://archives.neohapsis.com/archives/bugtraq/2002-06/0174.html
Various Sources x_refsource_confirm
http://support.wolfram.com/webmathematica/security/fileaccess.html
Scores
EPSS
0.1807
EPSS Percentile
95.2%
Details
Status
published
Products (2)
wolfram_research/webmathematica
4.0_amateur
wolfram_research/webmathematica
4.0_professional
Published
Oct 04, 2002
Tracked Since
Feb 18, 2026