exploit-db-mirror/exploits/cgi/remote/20156.txt
Offensive Security 36c084c351 DB: 2021-09-03
45419 changes to exploits/shellcodes

2 new exploits/shellcodes

Too many to list!
2021-09-03 13:39:06 +00:00

9 lines
No EOL
527 B
Text

source: https://www.securityfocus.com/bid/1587/info
A remote user is capable of gaining read access to any known file residing on a host running Netwin Netauth through directory traversal. Appending a series of '../' and the desired file name to the 'page' variable at the end of a request to netauth.cgi will allow a remote user to walk the entire directory tree above the Netauth directory.
For example:
http://target/cgi-bin/netauth.cgi?cmd=show&page=../../directory
will display the contents of the specified directory.