| 제목 | Whistle whistle 2.9.98 Path Traversal |
|---|
| 설명 | A path traversal vulnerability was identified on the endpoint http://127.0.0.1:8899/cgi-bin/sessions/get-temp-file. This vulnerability allows an unauthenticated attacker to read arbitrary files on the server's file system.
By manipulating the filename parameter with a value of /etc/passwd, as demonstrated by the proof-of-concept URL http://127.0.0.1:8899/cgi-bin/sessions/get-temp-file?filename=/etc/passwd, the server returns the contents of the /etc/passwd file. This indicates that the application is not properly sanitizing user-supplied input, enabling directory absolute paths to access files outside the intended directory.
Since no authentication is required to exploit this vulnerability, it poses a significant security risk, potentially leading to information disclosure, system compromise, or further attacks. |
|---|
| 원천 | ⚠️ http://127.0.0.1:8899/cgi-bin/sessions/get-temp-file?filename=/etc/passwd |
|---|
| 사용자 | dsonbacker (UID 46970) |
|---|
| 제출 | 2025. 05. 22. AM 05:34 (11 개월 ago) |
|---|
| 모더레이션 | 2025. 06. 08. PM 08:13 (18 days later) |
|---|
| 상태 | 수락 |
|---|
| VulDB 항목 | 311638 [Whistle 2.9.98 get-temp-file filename 디렉토리 순회] |
|---|
| 포인트들 | 20 |
|---|