Description
Directory traversal vulnerability in Web Blog 1.1 allows remote attackers to read arbitrary files via a .. (dot dot) in the file variable.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by Zone-h Security Team · textwebappscgi
https://www.exploit-db.com/exploits/23613
References (6)
Core 6
Core References
Mailing List mailing-list
x_refsource_bugtraq
http://marc.info/?l=bugtraq&m=107531194527602&w=2
Third Party Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/10740
Exploit, Patch, Vendor Advisory vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/9517
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/14978
Exploit, Patch, Vendor Advisory x_refsource_misc
http://www.zone-h.org/en/advisories/read/id=3822/
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://www.osvdb.org/3739
Scores
EPSS
0.1046
EPSS Percentile
93.3%
Details
Status
published
Products (1)
leif_m._wright/web_blog
1.1
Published
Jan 20, 2004
Tracked Since
Feb 18, 2026