Home » Hacking News » Hosting Controller Import Root Directory Command Execution Vulnerability
Hosting Controller Import Root Directory Command Execution Vulnerability
by Nikola Strahija on May 19th, 2002 The Import Root Directory (imp_rootdir.asp) script does not force an authentication challenge when accessed, and allows users to perform actions on files and directories below the Hosting Controller administrative root. It is possible to manipulate URL parameters to change the root directory to another arbitrary directory on the system (such as C:). This may enable a remote attacker to execute arbitrary commands on the underlying system, eventually leading to a full compromise.
Hosting Controller is an application which centralizes all hosting tasks to one interface. Hosting Controller runs on Microsoft Windows operating systems.
Remote: Yes
Exploit: This issue may be exploited with a web browser. The following example was submitted:
http://target/admin/import/imp_rootdir.asp?
result=1&www=C:&ftp=C:&owwwPath=C:&oftpPath=C: