exploit-db-mirror/platforms/php/webapps/24647.txt
Offensive Security fffbf04102 Updated
2013-12-03 19:44:07 +00:00

9 lines
No EOL
576 B
Text
Executable file

source: http://www.securityfocus.com/bid/11272/info
It is reported that ParaChat is susceptible to a directory traversal vulnerability. This issue is due to a failure of the application to properly sanitize user-supplied input data.
This vulnerability allows remote attackers to retrieve the contents of arbitrary, potentially sensitive files located on the serving computer with the credentials of the ParaChat server process.
Version 5.5 is reported susceptible to this vulnerability. Other versions may also be affected.
http://www.example.com:7877/..%5C/..%5C/