lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20050317025329.12376.qmail@www.securityfocus.com> Date: 17 Mar 2005 02:53:29 -0000 From: <cout@...erspace.org> To: bugtraq@...urityfocus.com Subject: Another includer.cgi problem? Hello to everyone I'm sorry if this was already posted but if it wasn't have a look at it. It seems that includer.cgi will do a very nice directory traversal for you but I don't know what version or other specific details but the vuln. is very high.I tried only a couple of them and it was enough for me.If the includer will serve a text file existed on the web server then it will serve you any file you want.It looks like this: If the server has a valid url http://server.com/path/includer.cgi?some_existing_text_file then it will hapilly also show http://server.com/path/includer.cgi?../../../../../../../../../../../etc/passwd Some versions even don't bother to go up the / directory http://server.com/path/includer.cgi?/etc/passwd Now don't go out and break other people's work and show others what a smart guy you are and what stupid other people are. Try to have fun with it and stop there.