Vulnerability & Exploit Database

Back to search

DnaLIMS Directory Traversal

This module exploits a directory traversal vulnerability found in dnaLIMS. Due to the way the viewAppletFsa.cgi script handles the 'secID' parameter, it is possible to read a file outside the www directory.

Free Metasploit Download

Get your copy of the world's leading penetration testing tool

 Download Now

Module Name

auxiliary/scanner/http/dnalims_file_retrieve

Authors

  • h00die <mike [at] shorebreaksecurity.com>
  • flakey_biscuit <nicholas [at] shorebreaksecurity.com>

References

Reliability

Development

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':

msf > use auxiliary/scanner/http/dnalims_file_retrieve msf auxiliary(dnalims_file_retrieve) > show actions ...actions... msf auxiliary(dnalims_file_retrieve) > set ACTION <action-name> msf auxiliary(dnalims_file_retrieve) > show options ...show and set options... msf auxiliary(dnalims_file_retrieve) > run