Short Name |
HTTP:DIR:PARAMETER-TRAVERSE |
---|---|
Severity |
Major |
Recommended |
No |
Category |
HTTP |
Keywords |
Parameter Directory Traversal |
Release Date |
2003/08/12 |
Update Number |
1213 |
Supported Platforms |
di-5.3+, idp-4.0+, isg-3.0+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+ |
This signature detects directory traversal attempts within HTTP GET or POST form parameters. Attackers can exploit a poorly-written CGI program to access or modify private files.
MidiCMS Website Builder is prone to a local file-include vulnerability and an arbitrary-file-upload vulnerability. An attacker can exploit these issues to upload arbitrary files onto the webserver, execute arbitrary local files within the context of the webserver, and obtain sensitive information. MidiCMS Website Builder 2011 is vulnerable; other versions may also be affected.