AI Score
Confidence
Low
EPSS
Percentile
77.9%
The ShellExample.cgi script in 4D WebSTAR 5.3.2 and earlier allows remote attackers to list arbitrary directories via a URL with the desired path and a “*” (asterisk) character.
ftp://ftp.4d.com/ACI_PRODUCT_REFERENCE_LIBRARY/4D_PRODUCT_DOCUMENTATION/PDF_Docs_by_4D_Product_A-Z/4D_WebSTAR/Software_Change_History.txt
www.atstake.com/research/advisories/2004/a071304-1.txt
www.securityfocus.com/bid/10721
exchange.xforce.ibmcloud.com/vulnerabilities/16687