header-logo
Suggest Exploit
vendor:
WebConnect
by:
SecurityFocus
7.5
CVSS
HIGH
Remote Denial of Service and Directory Traversal
22, 22.3
CWE
Product Name: WebConnect
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2004

OpenConnect WebConnect Multiple Vulnerabilities

WebConnect is reported prone to a remote denial of service vulnerability. A remote attacker may exploit this vulnerability to crash the WebConnect software and deny service for legitimate users. A directory traversal vulnerability is also reported to affect WebConnect. This issue is reported to exist due to a lack of sufficient sanitization performed on a user-supplied URI parameter that is passed to the 'jretest.html' script. A remote attacker may exploit this vulnerability to disclose the contents of server readable files.

Mitigation:

Ensure that user-supplied input is properly sanitized and validated before being passed to the 'jretest.html' script.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/12613/info

OpenConnect WebConnect is reported prone to multiple vulnerabilities. The following individual issues are reported:

WebConnect is reported prone to a remote denial of service vulnerability.

A remote attacker may exploit this vulnerability to crash the WebConnect software and deny service for legitimate users.

A directory traversal vulnerability is also reported to affect WebConnect. This issue is reported to exist due to a lack of sufficient sanitization performed on a user-supplied URI parameter that is passed to the 'jretest.html' script.

A remote attacker may exploit this vulnerability to disclose the contents of server readable files.

http://www.example.com:2080/jretest.html?lang=&parms=default&WCP_USER=..//..//..//..//..//boot.ini&action=
http://www.example.com:2080/COM1