Exploit IBM Lotus Domino 6/7 - HTTP webadmin.nsf Directory Traversal

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
23836
Проверка EDB
  1. Пройдено
Автор
DR_INSANE
Тип уязвимости
REMOTE
Платформа
WINDOWS
CVE
cve-2004-2311
Дата публикации
2004-03-17
Код:
source: https://www.securityfocus.com/bid/9900/info

It has been reported that Lotus Domino may be prone to a directory traversal vulnerability that may allow a remote attacker to access information outside the server root directory. The issue reportedly exists in the server's administrative interface accessed via 'webadmin.nsf'. The vulnerability may be exploited by a remote attacker by traversing outside the server root directory by using '../' directory traversal character sequences. Successful exploitation of this vulnerability may allow a remote attacker to gain access to sensitive information and/or modify the underlying file system.

IBM Lotus Domino server 6.5.1 has been reported to be prone to this issue, however, it is possible that other versions are affected as well.

1)Go to http://www.example.com/webadmin.nsf
2)Go to "Files" tab
3)From the "Tools" menu select to create a "new" folder
4)As the name of the new folder enter "/../../../../../../pr00f"

or

"/../../../../windows/win.ini"
 
Источник
www.exploit-db.com

Похожие темы