Exploit teamshare teamtrack 3.0 - Directory Traversal

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
19537
Проверка EDB
  1. Пройдено
Автор
RAIN FOREST PUPPY
Тип уязвимости
REMOTE
Платформа
WINDOWS
CVE
cve-1999-0933
Дата публикации
1999-10-02
teamshare teamtrack 3.0 - Directory Traversal
Код:
source: https://www.securityfocus.com/bid/689/info

TeamTrack 3.00 has a built-in webserver which is meant to be used during the evaluation period, or until IIS or Netscape Enterprise/FastTrack is installed. This server does not filter out requested paths containing the ../ sequence. Because of this, an attacker can specify a file outside of the normal web file structure. The name and relative path (from the web root) of the file must be known by the attacker.

Requesting the following URL from the TeamTrack server will display the contents of the target's SAM file: (NT only)
http ://target.com/../../../../../winnt/repair/sam._
 
Источник
www.exploit-db.com

Похожие темы