[原文]Thunderstone Texis CGI script allows remote attackers to obtain the full path of the web root via a request for a nonexistent file, which generates an error message that includes the full pathname.
A vulnerability in TEXIS allows an attacker to view the full path to the web root.
If the attacker submits an HTTP request for an invalid path, the server will return an error page containing the path to the web root. System information may also be revealed.
Versions prior to TEXIS 4.03.1049406926 20030403 are vulnerable.
Texis contains a flaw that may lead to an unauthorized information disclosure. The issue is triggered when sending a specially crafted request for a file that does not exist, which will disclose the installation path resulting in a loss of confidentiality.
Upgrade to version 4.03 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.