जमा करें #582867: Whistle whistle 2.9.98 Path Traversalजानकारी

शीर्षकWhistle whistle 2.9.98 Path Traversal
विवरणA path traversal vulnerability was identified on the endpoint http://127.0.0.1:8899/cgi-bin/sessions/get-temp-file. This vulnerability allows an unauthenticated attacker to read arbitrary files on the server's file system. By manipulating the filename parameter with a value of /etc/passwd, as demonstrated by the proof-of-concept URL http://127.0.0.1:8899/cgi-bin/sessions/get-temp-file?filename=/etc/passwd, the server returns the contents of the /etc/passwd file. This indicates that the application is not properly sanitizing user-supplied input, enabling directory absolute paths to access files outside the intended directory. Since no authentication is required to exploit this vulnerability, it poses a significant security risk, potentially leading to information disclosure, system compromise, or further attacks.
स्रोत⚠️ http://127.0.0.1:8899/cgi-bin/sessions/get-temp-file?filename=/etc/passwd
उपयोगकर्ता
 dsonbacker (UID 46970)
सबमिशन22/05/2025 05:34 AM (11 महीनों पहले)
संयम08/06/2025 08:13 PM (18 days later)
स्थितिस्वीकृत
VulDB प्रविष्टि311638 [Whistle 2.9.98 get-temp-file filename निर्देशिका ट्रैवर्सल]
अंक20

Might our Artificial Intelligence support you?

Check our Alexa App!