header-logo
Suggest Exploit
vendor:
e_Board
by:
Unknown
5.5
CVSS
MEDIUM
Directory Traversal
22
CWE
Product Name: e_Board
Affected Version From: Unknown
Affected Version To: Unknown
Patch Exists: NO
Related CWE:
CPE: a:e_board:e_board
Metasploit:
Other Scripts:
Platforms Tested: Unknown
Unknown

e_Board Directory Traversal Vulnerability

The e_Board application is vulnerable to a directory traversal vulnerability due to improper input sanitization. By including '../' directory traversal sequences and a NULL (%00) in the affected URI argument, an attacker can include the contents of arbitrary web-server readable files in the output of the requested page.

Mitigation:

The vendor should update the e_Board application to properly sanitize user-supplied input to prevent directory traversal attacks. Regular security updates and patches should be applied to the application.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/12048/info

It is reported that e_Board is vulnerable to a directory traversal vulnerability. This issue is due to a failure of the application to properly sanitize user-supplied input.

By including '../' directory traversal sequences and a NULL (%00) in the affected URI argument, attackers may reportedly cause the contents of arbitrary, potentially sensitive web-server readable files to be included in the output of the requested page. 

http://www.example.com/cgi-bin/eboard40/index2.cgi?frames=yes&board=demo&mode=Current&threads=Collapse&message=../../../../../../../../../../../etc/passwd%00