[] NeoSense

Accellion File Transfer - 'Appliance web_client_user_guide.html?lang' Traversal Arbitrary File Access

Author: Tim Brown
type: remote
platform: linux
port: 
date_added: 2010-02-10 
date_updated: 2014-06-03 
verified: 1 
codes: CVE-2009-4645;OSVDB-62290 
tags: 
aliases:  
screenshot_url:  
application_url: 

source: https://www.securityfocus.com/bid/38176/info

Accellion File Transfer Appliance is prone to multiple remote vulnerabilities, including:

- Multiple privilege-escalation issues
- A directory-traversal issue
- An HTML-injection issue
- A remote command-injection issue

An attacker may leverage these issues to execute arbitrary script code within the context of the webserver, steal cookie-based authentication credentials, obtain sensitive information, and execute arbitrary code or commands with superuser privileges. Other attacks are also possible.

https://www.example.com/courier/1000@1276123d688676a09e0100b4f54b239c/web_client_user_guide.html?lang=../../../../../etc/passwd