{"vuid":"VU#764027","idnumber":"764027","name":"zml.cgi does not adequately validate user input thereby allowing directory traversal","keywords":["zml.cgi","user input","directory traversal","../","Ztreet Markup Language"],"overview":"zml.cgi does not adequately validate user input, allowing for directory traversal out of the web root directory.","clean_desc":"The perl script zml.cgi reads and parses a file on the server, executing certain Server Side Include (SSI) directives found in the file. The script accepts a CGI parameter specifying the file that should be read and parsed. The script does not adequately validate this parameter, allowing for directory traversal out of the web root directory.","impact":"Attackers may read any file readable by the web server process.","resolution":"The CERT/CC is currently unaware of a practical solution to this problem.","workarounds":"","sysaffected":"","thanks":"Thanks to Blackshell Security Advisory for reporting this vulnerability.","author":"This document was written by Shawn Van Ittersum.","public":["http://www.jero.cc/zml/zml.html","http://www.securityfocus.com/bid/3759"],"cveids":["CVE-2001-1209"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2002-01-02T20:00:16Z","publicdate":"2001-12-31T00:00:00Z","datefirstpublished":"2002-09-26T22:02:43Z","dateupdated":"2002-09-26T22:02:46Z","revision":6,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"4","cam_population":"4","cam_impact":"4","cam_easeofexploitation":"15","cam_attackeraccessrequired":"20","cam_scorecurrent":"1.71","cam_scorecurrentwidelyknown":"2.16","cam_scorecurrentwidelyknownexploited":"3.96","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":1.71,"vulnote":null}