Carlo Gavazzi Powersoft 2.1.1.1 Directory Traversal
Posted by deepcore on September 15, 2017 – 8:54 am
This Metasploit module exploits a directory traversal vulnerability found in Carlo Gavazzi Powersoft versions 2.1.1.1 and below. The vulnerability is triggered when sending a specially crafted GET request to the server. The location parameter of the GET request is not sanitized and the sendCommand.php script will automatically pull down any file requested
Post a reply
You must be logged in to post a comment.