Guido Frassetto SEDUM HTTP Server 2.0 - Directory Traversal

EDB-ID:

20608

Author:

Joe Testa

Type:

remote

Platform:

Windows

Published:

2001-02-04

source: http://www.securityfocus.com/bid/2335/info

A remote user could gain read access to known files outside of the root directory in a SEDUM HTTP Server. Requesting a specially crafted URL composed of '../' or '.../' sequences will disclose the requested file.

http://target/../[file outside web root]

http://target/.../[file outside web root]