An attacker can make use of this vulnerability to step out of the root directory and access other parts of the file system.
This might give the attacker the ability to view restricted files, which could provide the attacker with more information required to further compromise the system.
https://www.acunetix.com/websitesecurity/directory-traversal/
Severity: critical
Fingerprint: ac4d53c4832b2491c591c07df231d2bcf231d2bc8117f206b4436c27ccc1d846
Found host file trough Directory traversal: 127.0.0.1 localhost # the following lines are desirable for ipv6 capable hosts ::1 ip6-localhost ip6-loopback fe00::0 ip6-localnet ff00::0 ip6-mcastprefix ff02::1 ip6-allnodes ff02::2 ip6-allrouters 127.0.1.1 gwg
Open service 149.210.97.57:443
2024-09-10 17:11
HTTP/1.1 200 OK Connection: close Transfer-Encoding: chunked Expect-CT: max-age=86400 Strict-Transport-Security: max-age=63072000; includeSubDomains; preload X-Frame-Options: SAMEORIGIN X-Content-Type-Options: nosniff Content-Security-Policy: default-src 'self'; frame-src * 'self'; img-src * 'self'; script-src 'wasm-unsafe-eval' https://cdn.jsdelivr.net/ 'sha256-LV+4Blj3LIWsLHvvq37tdHwBQpq6ZOI+wHw3XeGsJzM=' 'self' 'sha256-8yE2w7Bv8/Il8SvtEkB35j3QNRei9CKtdX8HgqblU04=' 'sha256-Pv4HyWUIdh/mQalp8JMzRdM1eTkfzYhRRnW/9m4pzQ8=' blob:; style-src https://cdn.jsdelivr.net/ 'unsafe-hashes' 'sha256-4Su6mBWzEIFnH4pAGMOuaeBrstwJN4Z3pq/s1Kn4/KQ=' 'sha256-kwpt3lQZ21rs4cld7/uEm9qI5yAbjYzx+9FGm/XmwNU=' 'self'; connect-src 'self'; worker-src 'self' blob:; child-src 'self' blob:; Cache-Control: no-cache Content-Type: text/html Content-Encoding: gzip <!doctype html> <html lang="en"> <head> <meta name="robots" content="noindex" /> <meta charset="utf-8" /> <meta http-equiv="X-UA-Compatible" content="IE=edge" /> <meta http-equiv="Cache-Control" content="no-cache, no-store, must-revalidate" /> <meta name="viewport" content="width=device-width,initial-scale=1.0" /> <link rel="stylesheet" href="/brand/brand.css?v=2" /> <link rel="icon" href="/favicon.ico" /> <title></title> <script type="module" crossorigin src="/assets/index-2024-08-01-c89ebba0b9.js"></script> <link rel="modulepreload" crossorigin href="/assets/index-2024-08-01-c89ebba0b9.js"> <link rel="modulepreload" crossorigin href="/assets/vendor-2024-08-01-c89ebba0b9.js"> <link rel="stylesheet" crossorigin href="/assets/style-2024-08-01-c89ebba0b9.css"> </head> <body> <noscript> <div> <div class="overlay-content"> <img src="/tlt_networks_logo.svg" /><br /><br /><br /><br /> <h4>JavaScript required!</h4> <p>In order to use web interface, please enable JavaScript in your browser settings.</p> <br /> <a href=""><button class="btn">Refresh Page</button></a> </div> </div> </noscript> <div id="app"></div> <script async src="https://cdn.jsdelivr.net/gh/openlayers/openlayers.github.io@4eccf2cf93856a69c7c982df04ae8b91b43aac52/en/v6.4.3/build/ol.js" integrity="sha384-RffttofZaGGmE3uVvQmIW/dh1bzuHAJtWkxFyjRkb7eaUWfHo3W3GV8dcET2xTPI" crossorigin="anonymous" data-allow-fail="true" ></script> <script> { let scripts = Array.from(document.querySelectorAll("script[src]:not([data-allow-fail='true'])")) scripts.forEach(el => (el.onerror = e => location.reload())) } </script> </body> </html>