CVE-2009-1479

Boxalino - Path Traversal via URL Parameter

Title source: llm
STIX 2.1

Exploitation Summary

EIP tracks 1 public exploit for CVE-2009-1479. PoCs published by Axel Neumann.

AI-analyzed exploit summary This advisory describes a directory traversal vulnerability in Boxalino, allowing attackers to read arbitrary files on the server file system. The proof-of-concept demonstrates the vulnerability by accessing the boot.ini file via a crafted HTTP POST request.

Description

Directory traversal vulnerability in client/desktop/default.htm in Boxalino before 09.05.25-0421 allows remote attackers to read arbitrary files via a .. (dot dot) in the url parameter.

Exploits (1)

exploitdb WRITEUP VERIFIED
by Axel Neumann · textwebappsmultiple
https://www.exploit-db.com/exploits/9872

This advisory describes a directory traversal vulnerability in Boxalino, allowing attackers to read arbitrary files on the server file system. The proof-of-concept demonstrates the vulnerability by accessing the boot.ini file via a crafted HTTP POST request.

Classification
Writeup 100%
Attack Type
Info Leak
Complexity
Trivial
Reliability
Reliable
Target: Boxalino (closed-source product)
No auth needed
Prerequisites: Network access to the target server
devstral-2 · analyzed Feb 16, 2026 Full analysis →

References (3)

Core 3
Core References
Third Party Advisory, VDB Entry mailing-list x_refsource_bugtraq
http://www.securityfocus.com/archive/1/507319/100/0/threaded
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/53932

Scores

EPSS 0.0232
EPSS Percentile 85.0%

Details

CWE
CWE-22
Status published
Products (1)
boxalino/boxalino
Published Oct 22, 2009
Tracked Since Feb 18, 2026