exploit-db-mirror/exploits/multiple/webapps/14001.txt
Offensive Security 36c084c351 DB: 2021-09-03
45419 changes to exploits/shellcodes

2 new exploits/shellcodes

Too many to list!
2021-09-03 13:39:06 +00:00

19 lines
No EOL
899 B
Text

# Exploit Title: Arbitrary File Download in InterScan Web Security
Virtual Appliance 5.0
# Date: 22-06-2010
# Author: Ivan Huertas
# Software Link:
http://downloadcenter.trendmicro.com/index.php?clk=tbl&clkval=249&regs=NABU?_loc=1
# Version: 5.0
# Tested on: Red Hat Nash 5.1
Vulnerability Description:
The vulnerability is caused due to an improper check in “com.trend.iwss.gui.servlet.exportreport”
servlet, allowing the download of arbitrary files. Using a path traversal technique, an attacker can
change the original path to the file, modifying the parameter “exportname”.
Servlet “com.trend.iwss.gui.servlet.ConfigBackup” is also affected by this vulnerability in the
parameter “pkg_name”
Download:
https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/14001.pdf (cybsec_advisory_2010_0606_InterScan_Web_Security_5_0_Arbitrary_File_Download.pdf)