exploit-db-mirror/exploits/php/webapps/24806.txt
Offensive Security b4c96a5864 DB: 2021-09-03
28807 changes to exploits/shellcodes
2021-09-03 20:19:21 +00:00

8 lines
No EOL
392 B
Text

source: https://www.securityfocus.com/bid/11848/info
It is reported that WebLibs is prone to a remote directory traversal vulnerability. This issue is due to a failure of the application to properly filter user-supplied input.
WebLibs 1.0 is affected by this vulnerability.
The following proof of concept is available:
<INPUT type=hidden value="/../../../../../etc/passwd" name="TextFile">