Pi3Web 2.0.3 before PL2, when installed on Windows as a desktop application and without using the Pi3Web/Conf/Intenet.pi3, allows remote attackers to cause a denial of service (crash or hang) and obtain the full pathname of the server via a request to a file in the ISAPI directory that is not an executable DLL, which triggers the crash when the DLL load fails, as demonstrated using Isapi\users.txt.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
http://www.securityfocus.com/archive/1/498771 | mailing list |
http://www.osvdb.org/49999 | vdb entry |
http://www.securityfocus.com/bid/32287 | exploit vdb entry patch |
http://www.securityfocus.com/archive/1/498575 | mailing list |
http://www.securityfocus.com/archive/1/498770 | mailing list |
http://www.securityfocus.com/archive/1/498602 | mailing list |
http://archives.neohapsis.com/archives/bugtraq/2008-11/0171.html | mailing list |
http://secunia.com/advisories/32696 | third party advisory vendor advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/46600 | vdb entry |
http://www.osvdb.org/49998 | vdb entry exploit |
http://www.securityfocus.com/archive/1/498865 | mailing list exploit |
https://www.exploit-db.com/exploits/7109 | exploit |