Chili!Soft ASP Sample Scripts...

- AV AC AU C I A
发布: 2001-02-20
修订: 2025-04-13

Chili!Soft ASP contains sample scripts which are vulnerable to a directory traversal attack. By including '/../' sequences in requests submitted to the vulnerable scripts, a remote attacker can force the script to read and display the contents of files outside the normal directory tree. This can permit the attacker to read files from the /opt/casp directory, including those which contain sensitive information including database usernames/passwords, server logs, and the admin interface username/password.

0%
暂无可用Exp或PoC
当前有0条受影响产品信息