IPCheck Server Monitor 畸形的”..”(两点)序列目录遍历漏洞

漏洞信息详情

IPCheck Server Monitor 畸形的”..”(两点)序列目录遍历漏洞

漏洞简介

IPCheck Server Monitor 5.3.3.639/640之前的版本存在目录遍历漏洞,远程攻击者可借助URL中畸形的\”..\”(两点)序列,包括:(1) \”..\\%2f\” (编码\”/\”斜杠), \”…./\” (多个点),和\”..\\%255c../\” (双重编码\”\\”反斜杠),来读取任意文件。

漏洞公告

参考网址

来源: XF

名称: ipcheck-url-directory-traversal(28341)

链接:http://xforce.iss.net/xforce/xfdb/28341

来源: BID

名称: 19473

链接:http://www.securityfocus.com/bid/19473

来源: BUGTRAQ

名称: 20060824 Re: Directory Traversal vulnerability in IPCheck Monitor Server

链接:http://www.securityfocus.com/archive/1/archive/1/444227/100/0/threaded

来源: BUGTRAQ

名称: 20060810 Directory Traversal vulnerability in IPCheck Monitor Server

链接:http://www.securityfocus.com/archive/1/archive/1/442822/100/0/threaded

来源: www.paessler.com

链接:http://www.paessler.com/ipcheck/history

来源: www.paessler.com

链接:http://www.paessler.com/forum/viewtopic.php?p=4047&sid=f8c0f03a69d9498338797c6ea3cc6733

来源: VUPEN

名称: ADV-2006-3259

链接:http://www.frsirt.com/english/advisories/2006/3259

来源: SECTRACK

名称: 1016676

链接:http://securitytracker.com/id?1016676

来源: SECUNIA

名称: 21468

链接:http://secunia.com/advisories/21468

来源: SREASON

名称: 1389

链接:http://securityreason.com/securityalert/1389

© 版权声明
THE END
喜欢就支持一下吧
点赞0 分享