header-logo
Suggest Exploit
vendor:
Hosting Controller
by:
Unknown
5.5
CVSS
MEDIUM
Directory Traversal
22
CWE
Product Name: Hosting Controller
Affected Version From: Unknown
Affected Version To: Unknown
Patch Exists: NO
Related CWE:
CPE: a:hosting_controller:hosting_controller
Metasploit:
Other Scripts:
Platforms Tested: Windows
Unknown

Directory Traversal in Hosting Controller DSNManager

The DSNManager script in Hosting Controller does not properly filter dot-dot-slash sequences from URL parameters, allowing an attacker to perform directory traversal attacks. By exploiting this vulnerability, an attacker can disclose the contents of arbitrary web-readable files or potentially add a Data Source Number (DSN) to an arbitrary directory.

Mitigation:

The vendor has not provided a specific mitigation or patch for this vulnerability. It is recommended to restrict access to the affected script or upgrade to a newer version of Hosting Controller that addresses this issue.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/4759/info

Hosting Controller is an application which consolidates all hosting tasks into one interface. Hosting Controller runs on Microsoft Windows operating systems.

The DSNManager script does not sufficiently filter dot-dot-slash (../) sequences from URL parameters, making it prone to directory traversal attacks. An attacker can exploit this condition to disclose the contents of arbitrary web-readable files or potentially add a DSN (Data Source Number) to an arbitrary directory. 

http://target/admin/dsn/dsnmanager.asp?DSNAction=ChangeRoot&RootName=D:\webspace\opendnsserver\targ
et\target.com\db\..\..\..\..\