
# Exploit Title: MaDDash 2.0.2 - Directory Listing # Date: 2018-06-18 # Vendor: perfSONAR # Download Link: https://github.com/esnet/maddash/archive/master.zip # Version: 2.0.2 # Exploit Author: ManhNho # CVE: CVE-2018-12522,CVE-2018-12523,CVE-2018-12524,CVE-2018-12525 # Category: Webapps # Tested on: Windows 7 --- Description --- A directory listing is inappropriately exposed, yielding potentially sensitive information to attackers. A directory listing provides an attacker with the complete index of all the resources located inside of the directory. The specific risks and consequences vary depending on which files are listed and accessible. ---Affected items--- http://127.0.0.1/maddash-webui/etc/ http://127.0.0.1/maddash-webui/lib/ http://127.0.0.1/maddash-webui/images/ http://127.0.0.1/maddash-webui/style/ ---References--- https://pastebin.com/eA5tGKf0
Maddash 2.0.2 directory listing Vulnerability / Exploit Source : Maddash 2.0.2 directory listing