source: http://www.securityfocus.com/bid/1587/info A remote user is capable of gaining read access to any known file residing on a host running Netwin Netauth through directory traversal. Appending a series of '../' and the desired file name to the 'page' variable at the end of a request to netauth.cgi will allow a remote user to walk the entire directory tree above the Netauth directory. For example: http://target/cgi-bin/netauth.cgi?cmd=show&page=../../directory will display the contents of the specified directory.
Related ExploitsTrying to match CVEs (1): CVE-2000-0782
Trying to match OSVDBs (1): 393
Other Possible E-DB Search Terms: netwin netauth 4.2, netwin netauth