Interactive Story Directory Traversal Vulnerability

Summary
It is possible to read arbitrary files on the remote server by requesting : GET /cgi-bin/story.pl?next=../../../file_to_read%00 An attacker may use this flaw to read arbitrary files on this server.
Solution
Upgrade story.pl to the latest version (1.4 or later).