Exploit Mollensoft Software Enceladus Server Suite 2.6.1/3.9 - Directory Traversal

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
22078
Проверка EDB
  1. Пройдено
Автор
[email protected]
Тип уязвимости
REMOTE
Платформа
WINDOWS
CVE
N/A
Дата публикации
2002-11-09
Код:
source: https://www.securityfocus.com/bid/6338/info

It has been reported that Enceladus fails to properly sanitize web requests. By sending a malicious web request to the vulnerable server, using directory traversal sequences, it is possible for a remote attacker to view and download sensitive resources located outside of the web root.

An attacker is able to traverse outside of the established web root by using dot-dot-slash (../) directory traversal sequences. An attacker may be able to obtain any web server readable files from outside of the web root directory.

ftp>cd cd @/....\ 
ftp> cd @@@@@@@@@@@/..c:\
 
Источник
www.exploit-db.com

Похожие темы