Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wp-pagenavi domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u918112125/domains/exploit.company/public_html/wp-includes/functions.php on line 6114
MegaBrowser Multiple Vulnerabilities - exploit.company
header-logo
Suggest Exploit
vendor:
MegaBrowser
by:
James Bercegay
7.5
CVSS
HIGH
Directory Traversal and FTP User Enumeration
22, 200
CWE
Product Name: MegaBrowser
Affected Version From: 0.71b
Affected Version To: 0.71b
Patch Exists: NO
Related CWE: N/A
CPE: a:quality_programming_corporation:megabrowser
Metasploit: N/A
Other Scripts: N/A
Platforms Tested: N/A
2005

MegaBrowser Multiple Vulnerabilities

MegaBrowser HTTP server is vulnerable to a directory traversal vulnerability which allows access to any file on the system as well as directory viewing of the root web directory. While not as serious as the previously mentioned vuln, this still poses a threat as it may allow an attacker to harvest a list of valid FTP usernames on the system.

Mitigation:

Vendor contacted, but never replied. No known solution.
Source

Exploit-DB raw data:

MegaBrowser Multiple Vulnerabilities

Vendor: Quality Programming Corporation
Product: MegaBrowser
Version: <= 0.71b
Website: http://www.megabrowser.com

BID: 7802 7803 

Description:
Megabrowser is a free standalone program that enables you to host websites and FTP sites by utilizing its powerful advanced peer-to-peer features. You can now host websites and FTP sites without paying any hosting fees. Simply store your sites in the directories of your choice on your laptop or personal computer. 

Directory Traversal Vulnerability:
MegaBrowser HTTP server is vulnerable to a directory traversal vulnerability which allows access to any file on the system as well as directory viewing of the root web directory 

http://www.someplace.com/../../../../../WINNT/repair/sam
http://www.someplace.com/../ 

FTP User Enumeration Vulnerability:
While not as serious as the previously mentioned vuln, this still poses a threat as it may allow an attacker to harvest a list of valid FTP usernames on the system. 

user blah 530 User can't log in user anonymous 331 Anonymous access allowed, send identity (e-mail name) as password 

Solution:
Vendor contacted, but never replied. No known solution. 

Credits:
James Bercegay of the GulfTech Security Research Team.