Directory traversal vulnerability in Digicraft Yak! server 2.0 through 2.1.2 allows remote attackers to read or write arbitrary files via "../" or "..\" sequences in commands such as (1) dir or (2) put.
Link | Tags |
---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/17740 | vdb entry |
http://marc.info/?l=full-disclosure&m=109788315103778&w=2 | mailing list |
http://securitytracker.com/id?1011708 | vdb entry |
http://secunia.com/advisories/12849 | third party advisory |
http://aluigi.altervista.org/adv/yak-adv.txt | exploit |
http://www.osvdb.org/10763 | vdb entry |
http://www.securityfocus.com/bid/11433 | vdb entry exploit |
http://www.securityfocus.com/archive/1/378533 | mailing list exploit |