Path: blob/master/documentation/modules/auxiliary/scanner/http/dicoogle_traversal.md
25681 views
Description
This module exploits an unauthenticated directory traversal vulnerability in the Dicoogle PACS Web Server v2.5.0 and possibly earlier, allowing an attacker to read arbitrary files with the web server privileges. While the application is java based, the directory traversal was only successfully tested against Windows targets.
Verification Steps
Start
msfconsoleuse auxiliary/scanner/http/dicoogle_traversalset RHOSTS [IP]run