eWON
tcp/81
An attacker can make use of this vulnerability to step out of the root directory and access other parts of the file system.
This might give the attacker the ability to view restricted files, which could provide the attacker with more information required to further compromise the system.
https://www.acunetix.com/websitesecurity/directory-traversal/
Severity: critical
Fingerprint: ac4d53c4832b2491c591c07df231d2bcf231d2bc8117f206b4436c27ccc1d846
Found host file trough Directory traversal: 127.0.0.1 localhost # the following lines are desirable for ipv6 capable hosts ::1 ip6-localhost ip6-loopback fe00::0 ip6-localnet ff00::0 ip6-mcastprefix ff02::1 ip6-allnodes ff02::2 ip6-allrouters 127.0.1.1 gwg
Severity: critical
Fingerprint: ac4d53c4832b2491752255c45f936da75f936da7803a10b95de235b82bb603b1
Found host file trough Apache traversal: 127.0.0.1 localhost # the following lines are desirable for ipv6 capable hosts ::1 ip6-localhost ip6-loopback fe00::0 ip6-localnet ff00::0 ip6-mcastprefix ff02::1 ip6-allnodes ff02::2 ip6-allrouters 127.0.1.1 gwg
Open service 149.210.72.228:81
2024-06-15 15:29
HTTP/1.1 302 Redirect Access-Control-Allow-Origin: * Access-Control-Allow-Credentials: true Server: eWON Date: Sat Jun 15 21:13:43 2024 GMT Connection: close Pragma: no-cache Cache-Control: no-cache,max-age=0,must-revalidate Content-Type: text/html Location: http://149.210.72.228/Ast/MainAst.shtm <html><head></head><body> Redirecting to <a href="http://149.210.72.228/Ast/MainAst.shtm">location</a>. </body></html>