Description
Multiple directory traversal vulnerabilities in Sambar Server 6.1 Beta 2 on Windows, and possibly other versions on Linux, when the administrative IP address restrictions have been modified from the default, allow remote authenticated users to read arbitrary files via (1) a "..\" (dot dot backslash) in the file parameter to showini.asp, or (2) an absolute path with drive letter in the log parameter to showlog.asp.
Exploits (1)
exploitdb
WRITEUP
VERIFIED
by Oliver Karow · textremotewindows
https://www.exploit-db.com/exploits/24163
References (6)
Core 6
Core References
Exploit, Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/11748
Exploit vdb-entry
x_refsource_sectrack
http://securitytracker.com/id?1010353
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/10444
Exploit x_refsource_misc
http://www.oliverkarow.de/research/sambar.txt
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/16287
Exploit vdb-entry
x_refsource_osvdb
http://www.osvdb.org/6585
Scores
EPSS
0.0765
EPSS Percentile
91.9%
Details
Status
published
Products (1)
sambar/sambar_server
6.1 beta2
Published
Dec 31, 2004
Tracked Since
Feb 18, 2026