8 lines
No EOL
616 B
Text
8 lines
No EOL
616 B
Text
source: https://www.securityfocus.com/bid/6338/info
|
|
|
|
It has been reported that Enceladus fails to properly sanitize web requests. By sending a malicious web request to the vulnerable server, using directory traversal sequences, it is possible for a remote attacker to view and download sensitive resources located outside of the web root.
|
|
|
|
An attacker is able to traverse outside of the established web root by using dot-dot-slash (../) directory traversal sequences. An attacker may be able to obtain any web server readable files from outside of the web root directory.
|
|
|
|
ftp>cd cd @/....\
|
|
ftp> cd @@@@@@@@@@@/..c:\ |