I also question some of the details of the vulnerability, in order to view or read the files in this directory, the service would have also had to have been running as root which of course is a horrible idea. So I am wondering, why the hell was the web server, running as root to begin with?
The obviously didn’t normalize the path properly, but I question the validity, of running the web service as root resulting in the service even having read permissions to /ect/passwd
Recommended Posts