vendor:
EPOLL SYSTEM
by:
Pouya_Server
7.5
CVSS
HIGH
Remote File Inclusion
98
CWE
Product Name: EPOLL SYSTEM
Affected Version From: All versions
Affected Version To: All versions
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2009
EPOLL SYSTEM Password.dat Exploit
This exploit allows an attacker to gain access to the admin password of the EPOLL SYSTEM by exploiting a Remote File Inclusion vulnerability. The exploit is coded in Python and requires two arguments, the target site and the path of the EPOLL SYSTEM installation. The exploit then connects to the target site and reads the password.dat file, which contains the admin password in MD5 format.
Mitigation:
Ensure that the web application is not vulnerable to Remote File Inclusion attacks by validating user input and using a web application firewall.