The provided text describes a local file inclusion (LFI) vulnerability in VoipSwitch, where insufficient input sanitization allows an attacker to read arbitrary files (e.g., `win.ini`) via path traversal sequences. The example URL demonstrates the exploit vector, but no functional code is included.
Classification
Writeup 90%
Attack Type
Info Leak
Complexity
Trivial
Reliability
Reliable
Target:VoipSwitch (version unspecified)
No auth needed
Prerequisites:Access to the vulnerable web application