CVE-2004-1678

Logicnow Perldesk - Path Traversal

Title source: rule
STIX 2.1

Description

Directory traversal vulnerability in pdesk.cgi in PerlDesk allows remote attackers to read portions of arbitrary files and possibly execute arbitrary Perl modules via ".." sequences terminated by a %00 (null) character in the lang parameter, which can leak portions of the requested files if a compilation error message occurs.

Exploits (1)

exploitdb WRITEUP VERIFIED
by Nikyt0x Argentina · textwebappscgi
https://www.exploit-db.com/exploits/24591

References (4)

Core 4
Core References
Exploit, Patch, Vendor Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/12512
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/19712
Exploit, Vendor Advisory vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/11160
Mailing List mailing-list x_refsource_bugtraq
http://marc.info/?l=bugtraq&m=109509026406554&w=2

Scores

EPSS 0.0510
EPSS Percentile 89.9%

Details

Status published
Products (1)
logicnow/perldesk
Published Sep 13, 2004
Tracked Since Feb 18, 2026