20 lines
1.2 KiB
Markdown
20 lines
1.2 KiB
Markdown
|
|
### [CVE-2012-10061](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-10061)
|
|||
|
|

|
|||
|
|

|
|||
|
|
&color=brightgreen)
|
|||
|
|
|
|||
|
|
### Description
|
|||
|
|
|
|||
|
|
Sockso Music Host Server versions <= 1.5 are vulnerable to a path traversal flaw that allows unauthenticated remote attackers to read arbitrary files from the server’s filesystem. The vulnerability exists in the HTTP interface on port 4444, where the endpoint /file/ fails to properly sanitize user-supplied input. Attackers can traverse directories and access sensitive files outside the intended web root.
|
|||
|
|
|
|||
|
|
### POC
|
|||
|
|
|
|||
|
|
#### Reference
|
|||
|
|
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/auxiliary/scanner/http/sockso_traversal.rb
|
|||
|
|
- https://www.exploit-db.com/exploits/18605
|
|||
|
|
- https://www.vulncheck.com/advisories/sockso-music-host-server-path-traversal
|
|||
|
|
|
|||
|
|
#### Github
|
|||
|
|
No PoCs found on GitHub currently.
|
|||
|
|
|