Lastlines.cgi path traversal and command execution vulnerabilities discovered by BrainRawt. lastlines.cgi is a script coded by David Powell that allows a user to view the contents of a logfile specified by the user. # $unixdir="path/here"; # $error_log is input by the user of the script. open(FILE, "$unix_dir/$error_log" This script inproperly filters in the input allowing the traditional "../../../../../" path traversal chars in return allowing the user to leave the hard coded $unix_dir and view any file readable by the webserver. EX:../../../../../../etc/motd This script is also missing a "<" in the open() function which will allow us to execute any command on that remote server that the webserver has permission to execute. EX: path/to/error_log;command arg1| Note: The author has been notified but hasnt replied.