Subject: | Directory listening at niketeam.nike.com |
Date: | Thu, 16 Feb 2017 20:35:01 +0530 |
To: | bug-WWW-Nike-NikePlus [...] rt.cpan.org |
From: | Sanit Bhiwani <sanitofficial [...] gmail.com> |
Vulnerability name :
Directory traversal in Spring framework
Vulnerability Description :
A directory traversal vulnerability that can lead to an attacker to obtain
any file on the file system that was also accessible to process in which
the Spring web application was running.
Vulenrable URL :
https://niketeam.nike.com/niketeamsports/content/
https://niketeam.nike.com/niketeamsports/
HOW To Reproduce this vulnerability :
1-> visit this URLs
https://niketeam.nike.com/niketeamsports/content/
https://niketeam.nike.com/niketeamsports/
2-> its containing list for directory files on that location
POC :
screenshot enclosed in attachment
Message body is not shown because sender requested not to inline it.
Message body is not shown because sender requested not to inline it.