exploit the possibilities

Tarantella Enterprise Directory Traversal

Tarantella Enterprise Directory Traversal
Posted Nov 30, 2018
Authored by Rafael Pedrero

Tarantella Enterprise versions prior to 3.11 suffer from a directory traversal vulnerability.

tags | exploit, file inclusion
advisories | CVE-2018-19753
MD5 | 6f4b68b3b5d4374eebffd81225dcd9c8

Tarantella Enterprise Directory Traversal

Change Mirror Download
Vulnerability found in 2009.

<!--
# Exploit Title: Directory Traversal in Tarantella Enterprise before 3.11
# Date: 30-11-2018
# Exploit Author: Rafael Pedrero
# Vendor Homepage: Homepage: http://www.sun.com/ & http://www.oracle.com/
# Software Link: the product is discontinued (vulnerability found in 2009)
# Version: Tarantella Enterprise before 3.11
# Tested on: All
# CVE : CVE-2018-19753
# Category: webapps


1. Description

Tarantella Enterprise before 3.11 allows Directory Traversal via a full
pathname preceded by the ./ sequence, as demonstrated by a
"/cgi-bin/secure/ttawlogin.cgi/?action=start&pg=./" substring.

A path traversal attack (also known as directory traversal) aims to access
files and directories that are stored outside the web root folder. By
manipulating variables that reference files with "dot-dot-slash (../)"
sequences and its variations or by using absolute file paths, it may be
possible to access arbitrary files and directories stored on file system
including application source code or configuration and critical system
files. It should be noted that access to files is limited by system
operational access control (such as in the case of locked or in-use files
on the Microsoft Windows operating system). The cgi ttawlogin.cgi can read
files if use "./" in the petition.


2. Proof of Concept

http://x.x.x.x/tarantella/cgi-bin/secure/ttawlogin.cgi/?action=start&pg=./fileexist
or (./../../../../../../../../../../../../../../etc/passwd)

3. Solution:

The product is discontinued.
https://www.oracle.com/us/assets/lifetime-support-hardware-301321.pdf

-->


Login or Register to add favorites

File Archive:

May 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    14 Files
  • 2
    May 2nd
    3 Files
  • 3
    May 3rd
    1 Files
  • 4
    May 4th
    18 Files
  • 5
    May 5th
    15 Files
  • 6
    May 6th
    21 Files
  • 7
    May 7th
    15 Files
  • 8
    May 8th
    19 Files
  • 9
    May 9th
    1 Files
  • 10
    May 10th
    2 Files
  • 11
    May 11th
    18 Files
  • 12
    May 12th
    39 Files
  • 13
    May 13th
    15 Files
  • 14
    May 14th
    17 Files
  • 15
    May 15th
    17 Files
  • 16
    May 16th
    2 Files
  • 17
    May 17th
    2 Files
  • 18
    May 18th
    15 Files
  • 19
    May 19th
    21 Files
  • 20
    May 20th
    15 Files
  • 21
    May 21st
    15 Files
  • 22
    May 22nd
    6 Files
  • 23
    May 23rd
    1 Files
  • 24
    May 24th
    1 Files
  • 25
    May 25th
    2 Files
  • 26
    May 26th
    23 Files
  • 27
    May 27th
    13 Files
  • 28
    May 28th
    18 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close