发布时间 :2001-09-08 00:00:00
修订时间 :2017-12-18 21:29:30

[原文]Directory traversal vulnerability in view_item CGI program in sglMerchant 1.0 allows remote attackers to read arbitrary files via a .. (dot dot) in the HTML_FILE parameter.

[CNNVD]SeaGlass Technologies sglMerchant 目录遍历漏洞(CNNVD-200109-021)

        CVE(CAN) ID: CAN-2001-1019
        SeaGlass Technologies sglMerchant是一套商业应用软件。

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)


- OVAL (用于检测的技术细节)


- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD
(官方数据源) CNNVD

- 其它链接及资源
(UNKNOWN)  BUGTRAQ  20010908 sglMerchant Version 1.0
(UNKNOWN)  XF  sglmerchant-dot-directory-traversal(7100)

- 漏洞信息

SeaGlass Technologies sglMerchant 目录遍历漏洞
中危 输入验证
2001-09-08 00:00:00 2005-10-20 00:00:00
        CVE(CAN) ID: CAN-2001-1019
        SeaGlass Technologies sglMerchant是一套商业应用软件。

- 公告与补丁



- 漏洞信息

sglMerchant view_item HTML_FILE Parameter Traversal Arbitrary File Access
Remote / Network Access Input Manipulation
Loss of Confidentiality

- 漏洞描述

Unknown or Incomplete

- 时间线

2001-09-08 Unknow
Unknow Unknow

- 解决方案

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

SeaGlass Technologies sglMerchant Directory Traversal Vulnerability
Input Validation Error 3309
Yes No
2001-09-08 12:00:00 2009-07-11 07:56:00
This vulnerability was submitted to BugTraq on September 8th, 2001 by Alexey Sintsov <>.

- 受影响的程序版本

SeaGlass Technologies Inc sglMerchant 1.0

- 漏洞讨论

sglMerchant is a web-commerce application.

sglMerchant does not adequately filter user-supplied input in the form of '../' sequences. It is possible for a remote attacker to construct a web request which will break out of wwwroot to browse the filesystem of the host. The attacker may exploit this issue to display arbitrary web-readable files.

The sensitive information contained in disclosed files may aid the attacker in making further, more educated attempts at fully compromising the host.

- 漏洞利用

This issue can be exploited with a web browser.

- 解决方案

Currently the SecurityFocus staff are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: <>.

- 相关参考