This Metasploit module exploits a directory traversal vulnerability found in dnaLIMS. Due to the way the viewAppletFsa.cgi script handles the secID parameter, it is possible to read a file outside the www directory.
51e9c7257950972cb9c2f3eadb03402eb6967e9df8461564e00e53de1edcfeba
This Metasploit module utilizes an administrative module which allows for command execution. This page is completely unprotected from any authentication when given a POST request.
cfcbce3052c73130003476d0ee627bdcb72ab71008ac686ffaae35583cfb31c0
dnaLIMS DNA sequencing application suffers from an improperly protected web shell, a directory traversal, insecure password storage, session hijacking, cross site scripting, and improperly protected content vulnerabilities.
2c765d1002998d2516a62972d8bae6e5afe2348f1e7d3cf6ef351c942e91a44c