exploit-db-mirror/platforms/multiple/remote/20625.txt
Offensive Security 5e2fc10125 DB: 2016-09-03
2016-09-03 13:13:25 +00:00

5 lines
No EOL
384 B
Text
Executable file

source: http://www.securityfocus.com/bid/2362/info
A remote user could gain read access to known files outside of the root directory where SilverPlatter WebSPIRS resides. Requesting a specially crafted URL composed of '../' sequences along with the known filename will disclose the requested file.
www.target.com/cgi-bin/webspirs.cgi?sp.nextform=../../../../../../path/to/file