Lucene search

K
exploitdbMarc MaiffretEDB-ID:20156
HistoryAug 17, 2000 - 12:00 a.m.

netwin netauth 4.2 - Directory Traversal

2000-08-1700:00:00
Marc Maiffret
www.exploit-db.com
23

AI Score

7.4

Confidence

Low

source: https://www.securityfocus.com/bid/1587/info

A remote user is capable of gaining read access to any known file residing on a host running Netwin Netauth through directory traversal. Appending a series of '../' and the desired file name to the 'page' variable at the end of a request to netauth.cgi will allow a remote user to walk the entire directory tree above the Netauth directory.

For example:

http://target/cgi-bin/netauth.cgi?cmd=show&page=../../directory

will display the contents of the specified directory.

AI Score

7.4

Confidence

Low

Related for EDB-ID:20156