mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-29 09:41:05 +00:00
23 lines
1003 B
Markdown
23 lines
1003 B
Markdown
![]() |
### [CVE-2021-35380](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35380)
|
||
|

|
||
|

|
||
|

|
||
|
|
||
|
### Description
|
||
|
|
||
|
A Directory Traversal vulnerability exists in Solari di Udine TermTalk Server (TTServer) 3.24.0.2, which lets an unauthenticated malicious user gain access to the files on the remote system by gaining access to the relative path of the file they want to download (http://url:port/file?valore).
|
||
|
|
||
|
### POC
|
||
|
|
||
|
#### Reference
|
||
|
- https://www.exploit-db.com/exploits/50638
|
||
|
- https://www.swascan.com/solari-di-udine/
|
||
|
|
||
|
#### Github
|
||
|
- https://github.com/ARPSyndicate/kenzer-templates
|
||
|
- https://github.com/StarCrossPortal/scalpel
|
||
|
- https://github.com/anonymous364872/Rapier_Tool
|
||
|
- https://github.com/apif-review/APIF_tool_2024
|
||
|
- https://github.com/youcans896768/APIV_Tool
|
||
|
|