Directory traversal vulnerability in the PXE Server (pxesrv.exe) in Acronis Snap Deploy 2.0.0.1076 and earlier allows remote attackers to read arbitrary files via directory traversal sequences to the TFTP service.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/41074 | vdb entry |
http://aluigi.altervista.org/adv/acropxe-adv.txt | exploit |
http://www.vupen.com/english/advisories/2008/0814/references | vdb entry |
http://www.securityfocus.com/bid/28182 | vdb entry exploit |
http://www.securityfocus.com/archive/1/489358/100/0/threaded | mailing list |
http://secunia.com/advisories/29305 | third party advisory vendor advisory |
http://securityreason.com/securityalert/3758 | third party advisory |
https://www.exploit-db.com/exploits/5228 | exploit |