Exploit Fortech Proxy+ 2.30 - Remote Administration

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
19942
Проверка EDB
  1. Пройдено
Автор
ANONYMOUS
Тип уязвимости
REMOTE
Платформа
WINDOWS
CVE
null
Дата публикации
1999-12-26
Fortech Proxy+ 2.30 - Remote Administration
Код:
source: https://www.securityfocus.com/bid/1226/info

By default, Fortech Proxy+ can be remotely administered by any user possessing no authorization simply by connecting to http://target:4400/admin.

In addition, the telnet gateway is open by default which can accomodate for anonymous packet forwarding. 

To remotely administer Proxy+ (given that the default port has not been changed):
http://target:4400/admin
 
Источник
www.exploit-db.com

Похожие темы