The ShellExample.cgi script in 4D WebSTAR 5.3.2 and earlier allows remote attackers to list arbitrary directories via a URL with the desired path and a * (asterisk) character.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Webstar | 4d | 4.0 (including) | 4.0 (including) |
Webstar | 4d | 5.2 (including) | 5.2 (including) |
Webstar | 4d | 5.2.1 (including) | 5.2.1 (including) |
Webstar | 4d | 5.2.2 (including) | 5.2.2 (including) |
Webstar | 4d | 5.2.3 (including) | 5.2.3 (including) |
Webstar | 4d | 5.2.4 (including) | 5.2.4 (including) |
Webstar | 4d | 5.3 (including) | 5.3 (including) |
Webstar | 4d | 5.3.1 (including) | 5.3.1 (including) |
Webstar | 4d | 5.3.2 (including) | 5.3.2 (including) |