Exploiting these issues may allow an attacker to obtain sensitive information that may aid in further attacks.
EXPLOIT/POC:
The following example URI is available:
http://www.example.com/cgi-bin/User_info/auth_user_file.txt
http://www.example.com/cgi-bin/dcforum/User_info/auth_user_file.txt
EXPLOIT/POC:
The following exploit is available:
http://downloads.securityfocus.com/vulnerabilities/exploits/55271.rb