5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:N/C:P/I:N/A:N
0.016 Low
EPSS
Percentile
87.2%
Jana Server contains a directory traversal vulnerability.
Versions 1.4x of Jana Server, a web server for Windows developed by T. Hauck, do not properly filter requests for hexadecimal encodings of “…” (dot-dot) and allows directory traversal out of the HTTP document root directory.
Remote users can view any file on the server with the privileges of the Jana server process.
Upgrade to Jana Server 2.0 beta or later at:
<http://www.jana-server.ocm.de/en/index.htm?/en/download.htm>
None.
132099
Filter by status: All Affected Not Affected Unknown
Filter by content: __ Additional information available
__ Sort by: Status Alphabetical
Expand all
Javascript is disabled. Click here to view vendors.
Notified: October 19, 2001 Updated: February 26, 2002
Affected
"In Version 1.4x -- [which] is not longer avalible from myself, or supported -- the error exists.
"In Jana 2.0 Beta 3 Version (or Beta 2 version) -- [which] is right now the current version -- that bug is fixed and should NOT longer exist."
The vendor has not provided us with any further information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23132099 Feedback>).
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
Thanks to nemesystm of the DHC for discovering this vulnerability.
This document was written by Shawn Van Ittersum.
CVE IDs: | CVE-2001-0557 |
---|---|
Severity Metric: | 2.63 Date Public: |