Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2018-7719 PoC — Acrolinx Server for Windows 路径遍历漏洞

Source
Associated Vulnerability
Title:Acrolinx Server for Windows 路径遍历漏洞 (CVE-2018-7719)
Description:Acrolinx Server for Windows是德国Acrolinx公司的一款基于Windows平台的智能语言分析服务器。 基于Windows平台的Acrolinx Server 5.2.5之前版本中存在路径遍历漏洞,该漏洞源于程序没有正确验证用户输入。攻击者可借助特制URL利用该漏洞查看系统上任意文件。
Description
Acrolinx Server prior to 5.2.5 suffers from a local file inclusion vulnerability.
File Snapshot

id: CVE-2018-7719 info: name: Acrolinx Server <5.2.5 - Local File Inclusion author: 0x_akoko ...
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.