Netscape Directory Server 4.12 - Directory Server Directory Traversal

EDB-ID:

20325


Author:

CORE-SDI

Type:

remote


Platform:

Windows

Date:

2000-10-25


source: https://www.securityfocus.com/bid/1839/info
 
 
Acquiring access to known files outside of the web root is possible through directory traversal techniques in Netscape Directory Server. This is made possible through the use of "\../" in a HTTP request. The following services are affected by this vulnerability:
 
- The Agent services server on port 8100/tcp
- The End Entity services server on port 443/tcp (Accessible through SSL)
- The Administrator services server on a random port configured during installation.
 
https://target/ca/\../\../\../\file.ext