Описание
Directory traversal vulnerability in GoAhead Web Server 2.1 allows remote attackers to read arbitrary files via a URL with an encoded / (%5C) in a .. (dot dot) sequence. NOTE: it is highly likely that this candidate will be REJECTED because it has been reported to be a duplicate of CVE-2001-0228.
Ссылки
- Vendor Advisory
- Vendor Advisory
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:a:goahead_software:goahead_webserver:2.1.1:*:*:*:*:*:*:*
cpe:2.3:a:goahead_software:goahead_webserver:2.1.2:*:*:*:*:*:*:*
cpe:2.3:a:goahead_software:goahead_webserver:2.1.3:*:*:*:*:*:*:*
cpe:2.3:a:goahead_software:goahead_webserver:2.1.4:*:*:*:*:*:*:*
cpe:2.3:a:goahead_software:goahead_webserver:2.1.5:*:*:*:*:*:*:*
cpe:2.3:a:orange_software:orange_web_server:2.1:*:*:*:*:*:*:*
Конфигурация 2
cpe:2.3:o:montavista_software:hard_hat_linux:1.0:*:*:*:*:*:*:*
EPSS
Процентиль: 90%
0.05241
Низкий
5 Medium
CVSS2
Дефекты
NVD-CWE-Other
Связанные уязвимости
github
почти 4 года назад
Directory traversal vulnerability in GoAhead Web Server 2.1 allows remote attackers to read arbitrary files via a URL with an encoded / (%5C) in a .. (dot dot) sequence. NOTE: it is highly likely that this candidate will be REJECTED because it has been reported to be a duplicate of CVE-2001-0228.
EPSS
Процентиль: 90%
0.05241
Низкий
5 Medium
CVSS2
Дефекты
NVD-CWE-Other