CVE-2008-0760
SafeNet Sentinel Protection Server < 7.4.1 and Sentinel Keys Server < 1.0.4.0 - Path Traversal via URI
Title source: llmExploitation Summary
EIP tracks 1 public exploit for CVE-2008-0760. PoCs published by Luigi Auriemma.
AI-analyzed exploit summary This exploit demonstrates a directory traversal vulnerability in Sentinel Protection Server and Keys Server. By sending a crafted HTTP GET request, an attacker can access sensitive files outside the intended directory, such as boot.ini.
Description
Directory traversal vulnerability in SafeNet Sentinel Protection Server 7.4.1.0 and earlier, and Sentinel Keys Server 1.0.4.0 and earlier, allows remote attackers to read arbitrary files via a ..\ (dot dot backslash) in the URI. NOTE: this issue reportedly exists because of an incomplete fix for CVE-2007-6483.
Exploits (1)
This exploit demonstrates a directory traversal vulnerability in Sentinel Protection Server and Keys Server. By sending a crafted HTTP GET request, an attacker can access sensitive files outside the intended directory, such as boot.ini.