Home page logo

pen-test logo Penetration Testing mailing list archives

post-discovery in web vulnerability
From: davemitch () mailinator com
Date: 6 Mar 2008 06:21:00 -0000

hi all,
on using a vulnerability scanner for web applications (wapiti) on an internal website, the output is a list of attack 
URLs ,like the one below

hxxp://192.168.x.y*/pages/abstract.asp?paperid=..%2F..%2F..%2F..%2F..%2F..%2 F..%2F..%2F..%2F..%2Fboot.ini

On pasting the URL in a browser, the error message is like this


Microsoft VBScript runtime error '800a000d' 

Type mismatch: '[string: "¿'"("]' 

E:\INETPUB\VHOSTS\****.***.***\HTTPDOCS\WEBROOT\PA GES\../includes/toplinks-archive-courses-spas.asp, line 1
__________________________________________________ __________________________________________________ 

What needs to be done next, to exploit the vulnerability detected by the vulnerability scanner -wapiti ?
Any ideas or suggestions in this regard are welcome.


This list is sponsored by: Cenzic

Need to secure your web apps NOW?
Cenzic finds more, "real" vulnerabilities fast.
Click to try it, buy it or download a solution FREE today!


  By Date           By Thread  

Current thread:
  • post-discovery in web vulnerability davemitch (Mar 06)
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]