exploit-db-mirror/exploits/php/webapps/18185.txt
Offensive Security b4c96a5864 DB: 2021-09-03
28807 changes to exploits/shellcodes
2021-09-03 20:19:21 +00:00

25 lines
No EOL
1.4 KiB
Text
Raw Permalink Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

#Name: Muster Render Farm Management System Arbitrary File Download
#Vendor Website : http://www.vvertex.com/muster.html
#Date Released : November 29, 2011
#Affected Software : Muster < 6.20
#Researcher : Nick Freeman (nick.freeman@security-assessment.com)
#Description
#Security-Assessment.com has discovered a vulnerability with the Muster 6.1.6 web management server. This issue #can be exploited by an unauthenticated user to gain full control of the web management interface, and to send #arbitrary commands to all Muster clients.
#Exploitation
#It is possible to download any file on the Muster server by exploiting a vulnerability in the web server. By #using directory traversal characters (\..\..\) in the URL, it is possible to specify any file on the file #system to be served to the client. Exploitation of this vulnerability does not require authentication. The #table below includes an example HTTP Request that would allow the download of the “muster.db” SQLite database:
#Example of Malicious HTTP Request :
GET /a\..\..\muster.db
HTTP/1.1 Host: musterserver:8690
#This SQLite database contains a table with all users of the application together with base64-encoded #passwords. By retrieving this database or other similar configuration files, it is possible to gain #administrative access over the render farm.
#Solution
#A patch is available from the vendors website. Version 6.20 remediates this vulnerability.