8 lines
No EOL
611 B
Text
8 lines
No EOL
611 B
Text
source: https://www.securityfocus.com/bid/17474/info
|
|
|
|
SAXoPRESS is prone to a directory-traversal vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input.
|
|
|
|
An attacker can exploit this vulnerability to retrieve and execute arbitrary files from the vulnerable system in the context of the affected application. Information obtained may aid attackers in further attacks.
|
|
|
|
http://www.example.com/apps/pbcs.dll/misc?url=../../../../../../../../../../winnt/system.ini
|
|
http://www.example.com/apps/pbcs.dll/misc?url=../../../../../../../../../../winnt/system32/cmd.exe |