vendor:
MobaXterm Personal Edition
by:
John Page AKA hyp3rlinx
5,3
CVSS
MEDIUM
Path Traversal Remote File Disclosure
22
CWE
Product Name: MobaXterm Personal Edition
Affected Version From: MobaXterm Personal Edition v9.4
Affected Version To: MobaXterm Personal Edition v10.3
Patch Exists: YES
Related CWE: CVE-2017-6805
CPE: a:mobatek:mobaxterm:9.4
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Windows
2017
MobaXterm TFTP Directory Traversal 0day Exploit
Remote attackers can use UDP socket connection to TFTP server port 69 and send Read request, to retrieve otherwise protected files using directory traversal attacks e.g. ../../../../Windows/system.ini. Start MobaXterm TFTP server which listens on default TFTP port 69.
Mitigation:
Upgrade to MobaXterm Personal Edition v10.4 or later.