Mike Spice's Quiz Me! does not adequately validate user input, allowing directory traversal. As a result, an attacker can cause Quiz Me! to overwrite any file on the server to which the web server process has write privileges.
Mike Spice's Quiz Me! is a CGI script written in Perl, enabling webmasters to publish interactive quizzes on their sites. The CGI variable 'quiz' is passed by Quiz Me! to Perl's open() function, without adequate validation to filter '../' sequences and null bytes. As a result, an attacker can cause Quiz Me! to traverse directories and overwrite any file on the server to which the web server process has write privileges.
Remote attackers can overwrite files on the server.
Upgrade to version 0.6 or later of Quiz Me!:
Thanks to Mike Spice for reporting this vulnerability.
This document was written by Shawn Van Ittersum.
|Date First Published:||2002-09-18|
|Date Last Updated:||2002-09-18 14:08 UTC|