[UNIX] Alstrasoft Epay Pro Directory Traversal
From: SecuriTeam (support_at_securiteam.com)
To: email@example.com Date: 29 Sep 2005 15:38:11 +0200
The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion
The SecuriTeam alerts list - Free, Accurate, Independent.
Get your security news from a reliable source.
- - - - - - - - -
Alstrasoft Epay Pro Directory Traversal
<http://www.alstrasoft.com/epay.htm> EPay Pro is "the ultimate software
solution for those who wish to run their own Paypal, Stormpay, or e-gold
type of online business. Epay Pro comes with a ready out of the box
website with all the features you need to run your own payment gateway
Alstrasoft Epay Pro has been found to be vulnerable to a directory
traversal vulnerability, allowing remote attackers to access sensitive
information on the vulnerable system.
* Epay Pro versions 2.0 and prior
EPay's Pro vulnerability caused by an improper validation of user-supplied
A remote attacker could embed in the index.php etc/passwd containing
embedded code in the payment or send parameter which, once the link is
clicked, would be executed to see passwords within the security context of
the hosting server. An attacker could use this vulnerability to see all
the victim's password authentication credentials.
The information has been provided by <mailto:GeMeGeMeS@Gmail.Com>
The original article can be found at:
This bulletin is sent to members of the SecuriTeam mailing list.
To unsubscribe from the list, send mail with an empty subject line and body to: firstname.lastname@example.org
In order to subscribe to the mailing list, simply forward this email to: email@example.com
The information in this bulletin is provided "AS IS" without warranty of any kind.
In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.