Neohapsis is currently accepting applications for employment. For more information, please visit our website www.neohapsis.com or email firstname.lastname@example.org
From: Tamer Sahin (tssecurityoffice.net)
Date: Mon Jan 14 2002 - 16:38:56 CST
-----BEGIN PGP SIGNED MESSAGE-----
Web Server 4D/eCommerce 3.5.3 Directory Traversal Vulnerability
December 15, 2002
Product / Vendor:
Web Server 4D/eCommerce is a single application that includes a
shopping cart, credit card authorization, and order tracking.
A vulnerability exists in WS4D/eCommerce which could allow an
unauthorized user to gain access to a known file residing on the
This is achievable if a specially crafted URL composed of double dot
"../" directory traversal sequences, with Unicode character
representations substituted for "/" and "\" , is submitted to a host.
And view webserver log file.
Windows 2000 / Web Server 4D/eCommerce 3.5.3
Web Server 4D/eCommerce 3.5.3 (And may be other)
http://www.securityoffice.net is not responsible for the misuse or
illegal use of any of the information and/or the software listed on
this security advisory.
PGP Key ID: 0x2B5EDCB0 Fingerprint:
B96A 5DFC E0D9 D615 8D28 7A1B BB8B A453 2B5E DCB0
-----BEGIN PGP SIGNATURE-----
Version: PGP 7.1
-----END PGP SIGNATURE-----