An attacker can make use of this vulnerability to step out of the root directory and access other parts of the file system.
This might give the attacker the ability to view restricted files, which could provide the attacker with more information required to further compromise the system.
https://www.acunetix.com/websitesecurity/directory-traversal/
Severity: critical
Fingerprint: ac4d53c4832b2491752255c45f936da7803a10b95de235b8d68862f5bb1e8f24
Found host file trough Apache traversal: 127.0.0.1 localhost # the following lines are desirable for ipv6 capable hosts ::1 ip6-localhost ip6-loopback fe00::0 ip6-localnet ff00::0 ip6-mcastprefix ff02::1 ip6-allnodes ff02::2 ip6-allrouters 127.0.1.1 gwg 192.168.1.1 gwg.dev
Severity: critical
Fingerprint: ac4d53c4832b2491c591c07df231d2bc8117f206b4436c2741264882d244fa61
Found host file trough Directory traversal: 127.0.0.1 localhost # the following lines are desirable for ipv6 capable hosts ::1 ip6-localhost ip6-loopback fe00::0 ip6-localnet ff00::0 ip6-mcastprefix ff02::1 ip6-allnodes ff02::2 ip6-allrouters 127.0.1.1 gwg 192.168.1.1 gwg.dev
An attacker can make use of this vulnerability to step out of the root directory and access other parts of the file system.
This might give the attacker the ability to view restricted files, which could provide the attacker with more information required to further compromise the system.
https://www.acunetix.com/websitesecurity/directory-traversal/
Severity: critical
Fingerprint: ac4d53c4832b2491c591c07df231d2bc8117f206b4436c2741264882d244fa61
Found host file trough Directory traversal: 127.0.0.1 localhost # the following lines are desirable for ipv6 capable hosts ::1 ip6-localhost ip6-loopback fe00::0 ip6-localnet ff00::0 ip6-mcastprefix ff02::1 ip6-allnodes ff02::2 ip6-allrouters 127.0.1.1 gwg 192.168.1.1 gwg.dev
Severity: critical
Fingerprint: ac4d53c4832b2491752255c45f936da7803a10b95de235b8d68862f5bb1e8f24
Found host file trough Apache traversal: 127.0.0.1 localhost # the following lines are desirable for ipv6 capable hosts ::1 ip6-localhost ip6-loopback fe00::0 ip6-localnet ff00::0 ip6-mcastprefix ff02::1 ip6-allnodes ff02::2 ip6-allrouters 127.0.1.1 gwg 192.168.1.1 gwg.dev
Open service 188.206.11.235:8080
2024-04-24 11:07
HTTP/1.1 200 OK Date: Wed, 24 Apr 2024 11:26:35 GMT Server: PrHTTPD Ver1.0 x-frame-options: SAMEORIGIN x-xss-protection: 1; mode=block x-content-type-options: nosniff Connection: Close Content-Encoding: Content-Language: ja Content-Type: text/html; charset=UTF-8 Last-Modified: Wed, 13 Dec 2023 11:23:24 GMT Content-Length: 7402 Page title: Main <!DOCTYPE html> <html> <head> <meta charset="UTF-8"> <meta name="viewport" content="width=device-width, initial-scale=1.0"> <title>Main</title> <style type="text/css" media="screen"> @font-face { font-family: 'ITMFont'; src: url('ITMFont.woff') format('woff'); } html, body { height:100%; background-color: #ffffff; font-family: ITMFont;} body { margin: 0; padding: 0; overflow: auto;} ::-moz-selection { color: #fff; background-color: #000; } ::selection { color: #fff; background-color: #000;} #TITLE {position:fixed;left:0px;top:0px; width: 100%;height: 100%;display:flex;flex-direction:row;align-items:center;} #BACK {margin: auto;width: 800px;height: 555px; background-image: url(start.png); } ::-ms-clear { display: none;} </style> <link rel="preload" href="ITMFont.woff" as="font" type="font/woff" crossorigin> <script type="text/javascript" src="/sha256.js" defer></script> <script type="text/javascript" src="script.js" defer></script> <script type="text/javascript" defer> var isLogin = false; var pageToken = '00000000000000000000000000000000'; var _skipBeforeUnloadEvent = 0; window.onbeforeunload = function () { if (isLogin) { if (0 < _skipBeforeUnloadEvent) { _skipBeforeUnloadEvent--; return; } // message var ScreenIDStr = 'ffff'; // ScreenID var PartIDStr = 'ffff'; // PartID var EventTypeStr = '000a'; // GUIEventType var EventDataTypeStr = '0000'; // GUIEventDataType var NumEventDataStr = 'ffffffff'; // NumberEventData var ArrayDataStr = '0000'; // ArrayData var StringDataStr = '0000'; // StringData var logoutMsg = 'snD=' + pageToken + ScreenIDStr + PartIDStr + EventTypeStr + EventDataTypeStr + NumEventDataStr + ArrayDataStr + StringDataStr; // send start() // XMLHttpRequest()は到達が保証されないので、sendBeaconに変更 // フルアドレスが上手くいかないので/cmdのみに navigator.sendBeacon('/cmd', logoutMsg); } }; function login() { //alert('login'); isLogin = true; } /// updatePageToken ( actionscript ) function updatePageToken(inPageToken) { pageToken = inPageToken; } /// logout ( actionscript ) function logout() { //alert('logout'); isLogin = false; pageToken = '00000000000000000000000000000000'; } /// set title (actionscript ) function setTitle(inTitleStr) { //alert(inTitleStr); top.document.title = inTitleStr; } /// getDigest ( actionscript ) function getDigest(inStr) { try { return CryptoJS.SHA256(inStr).toString(CryptoJS.enc.Hex); } catch (e) { return null; } } function addSkipBeforeUnloadEvent() { _skipBeforeUnloadEvent++; } // 画面サイズ保持(js参照用) var Stage = { width: 800, height: 600 }; // ロード時処理 window.addEventListener("load", function () { setFlashArea(getBrowserWidth(), getBrowserHeight()); }); // リサイズ時処理 window.addEventListener("resize", function () { // スクロールバー表示に変化があった場合は再計算する if (setFlashArea(getBrowserWidth(), getBrowserHeight())){ setFlashArea(getBrowserWidth(), getBrowserHeight()); } }); // 画面表示エリアの変更とスクロールバーの表示切