Carlo Gavazzi Powersoft 2.1.1.1 Directory Traversal

Discussion in 'News Aggregator' started by Packet Storm, 15 Sep 2017.

  1. Packet Storm

    Packet Storm Guest

    This Metasploit module exploits a directory traversal vulnerability found in Carlo Gavazzi Powersoft versions 2.1.1.1 and below. The vulnerability is triggered when sending a specially crafted GET request to the server. The location parameter of the GET request is not sanitized and the sendCommand.php script will automatically pull down any file requested

    Continue reading...
     

Share This Page

Loading...