Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-wxpg-jc4m-2rq2

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

bozotic HTTP server (aka bozohttpd) before 20140708, as used in NetBSD, truncates paths when checking .htpasswd restrictions, which allows remote attackers to bypass the HTTP authentication scheme and access restrictions via a long path.

bozotic HTTP server (aka bozohttpd) before 20140708, as used in NetBSD, truncates paths when checking .htpasswd restrictions, which allows remote attackers to bypass the HTTP authentication scheme and access restrictions via a long path.

EPSS

Процентиль: 68%
0.00573
Низкий

Связанные уязвимости

ubuntu
больше 11 лет назад

bozotic HTTP server (aka bozohttpd) before 20140708, as used in NetBSD, truncates paths when checking .htpasswd restrictions, which allows remote attackers to bypass the HTTP authentication scheme and access restrictions via a long path.

nvd
больше 11 лет назад

bozotic HTTP server (aka bozohttpd) before 20140708, as used in NetBSD, truncates paths when checking .htpasswd restrictions, which allows remote attackers to bypass the HTTP authentication scheme and access restrictions via a long path.

debian
больше 11 лет назад

bozotic HTTP server (aka bozohttpd) before 20140708, as used in NetBSD ...

EPSS

Процентиль: 68%
0.00573
Низкий