Exploit Cart32 3.0 - 'expdate' Administrative Information Disclosure

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
20019
Проверка EDB
  1. Пройдено
Автор
CASSIUS
Тип уязвимости
REMOTE
Платформа
WINDOWS
CVE
cve-2000-0430
Дата публикации
2000-05-03
Код:
source: https://www.securityfocus.com/bid/1358/info

By appending the string "/expdate" to a request for the cart32.exe executable, (http: //target/cgi-bin/cart32.exe/expdate) an attacker can access an error message followed by a debugging page containing the server variables, the Cart32 administration directory and possibly the contents of the cgi-bin.

http: //target/cgi-bin/cart32.exe/expdate
 
Источник
www.exploit-db.com

Похожие темы