Описание
HTTP File Server (HFS) before 2.2c allows remote attackers to obtain configuration and usage details by using an id element such as %version% in HTTP Basic Authentication instead of a username and password, as demonstrated by placing this id element in the userinfo subcomponent of a URL.
HTTP File Server (HFS) before 2.2c allows remote attackers to obtain configuration and usage details by using an id element such as %version% in HTTP Basic Authentication instead of a username and password, as demonstrated by placing this id element in the userinfo subcomponent of a URL.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2008-0410
- https://exchange.xforce.ibmcloud.com/vulnerabilities/39871
- http://secunia.com/advisories/28631
- http://securityreason.com/securityalert/3583
- http://www.rejetto.com/hfs/?f=wn
- http://www.securityfocus.com/archive/1/486872/100/0/threaded
- http://www.securityfocus.com/bid/27423
- http://www.syhunt.com/advisories/hfs-1-template.txt
- http://www.syhunt.com/advisories/hfshack.txt
Связанные уязвимости
HTTP File Server (HFS) before 2.2c allows remote attackers to obtain configuration and usage details by using an id element such as <id>%version%</id> in HTTP Basic Authentication instead of a username and password, as demonstrated by placing this id element in the userinfo subcomponent of a URL.