header-logo
Suggest Exploit
vendor:
Pinky
by:
5.5
CVSS
MEDIUM
Directory Traversal
22
CWE
Product Name: Pinky
Affected Version From: Pinky 1.0
Affected Version To: Unknown
Patch Exists: NO
Related CWE:
CPE:
Metasploit:
Other Scripts:
Platforms Tested:

Pinky Directory Traversal Vulnerability

Pinky is prone to a directory-traversal vulnerability because it fails to sufficiently sanitize user-supplied input. Exploiting this issue will allow an attacker to read files outside the webroot directory. Information harvested may aid in launching further attacks.

Mitigation:

It is recommended to sanitize user-supplied input to prevent directory traversal attacks. Additionally, access controls should be implemented to restrict access to sensitive files and directories.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/43358/info

Pinky is prone to a directory-traversal vulnerability because it fails to sufficiently sanitize user-supplied input.

Exploiting this issue will allow an attacker to read files outside the webroot directory. Information harvested may aid in launching further attacks.

Pinky 1.0 is vulnerable; other versions may also be affected.

http://www.example.com/%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../windows/win.ini