MonGoose 2.4 Directory Traversal Vulnerability

2009.04.16
Credit: e.wiZz!
Risk: Medium
Local: No
Remote: Yes
CWE: CWE-22


CVSS Base Score: 4/10
Impact Subscore: 2.9/10
Exploitability Subscore: 8/10
Exploit range: Remote
Attack complexity: Low
Authentication: Single time
Confidentiality impact: Partial
Integrity impact: None
Availability impact: None

######### MonGoose 2.4 (win) webserver Directory Traversal ######### ######By: e.wiZz! ######Site: www.balcansecurity.com Found with ServMeNot (world's sexiest fuzzer :P) In the wild... ######################################################################################### [Info]: Easy to use web server for Windows and UNIX. Mongoose provides simple and clean API for embedding it into existing programs. Targeting Web application developers, embedded system developers, and people who need to setup file sharing quickly. [Site]: http://code.google.com/p/mongoose/ [Vulnerability]: http://[localhost]/../../../../../../boot.ini


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top