ID CVE-2004-2116
Type cve
Reporter NVD
Modified 2018-08-13T17:47:20
Description
Directory traversal vulnerability in Tiny Server 1.1 allows remote attackers to read or download arbitrary files via a .. (dot dot) in the URL.
{"id": "CVE-2004-2116", "bulletinFamily": "NVD", "title": "CVE-2004-2116", "description": "Directory traversal vulnerability in Tiny Server 1.1 allows remote attackers to read or download arbitrary files via a .. (dot dot) in the URL.", "published": "2004-12-31T00:00:00", "modified": "2018-08-13T17:47:20", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:NONE/A:NONE/"}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2004-2116", "reporter": "NVD", "references": ["http://packetstormsecurity.com/files/129320/Tiny-Server-1.1.9-Arbitrary-File-Disclosure.html", "http://www.securityfocus.com/bid/9485", "https://exchange.xforce.ibmcloud.com/vulnerabilities/14927", "https://exchange.xforce.ibmcloud.com/vulnerabilities/99048", "http://marc.info/?l=bugtraq&m=107496530806730&w=2"], "cvelist": ["CVE-2004-2116"], "type": "cve", "lastseen": "2018-08-14T12:14:08", "history": [{"bulletin": {"assessment": {"href": "", "name": "", "system": ""}, "bulletinFamily": "NVD", "cpe": ["cpe:/a:tinyserver:tinyserver:1.1"], "cvelist": ["CVE-2004-2116"], "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:NONE/A:NONE/"}, "description": "Directory traversal vulnerability in Tiny Server 1.1 allows remote attackers to read or download arbitrary files via a .. (dot dot) in the URL.", "edition": 3, "enchantments": {"score": {"modified": "2017-07-11T11:14:40", "value": 5.0, "vector": "NONE"}}, "hash": "23fa0f175b666f35fb5f574a83104ed4f7497402e5336ef0a79e32ba2aefc527", "hashmap": [{"hash": "d41d8cd98f00b204e9800998ecf8427e", "key": "scanner"}, {"hash": "601892ece72be3be2f57266ca2354792", "key": "reporter"}, {"hash": "1b9c64ecd5febc4e671df57ce06a3f59", "key": "cpe"}, {"hash": "90337b14602aea3e39acf0d5a8703074", "key": "description"}, {"hash": "6d3f4796275bb54c21a33b82f399cc6d", "key": "assessment"}, {"hash": "63e864112690bcec10f4d34f264a3681", "key": "references"}, {"hash": "8d01b3f7405442a63e5c8249be351108", "key": "published"}, {"hash": "d2c6e08a65907b8e41599626c2c9a2be", "key": "cvelist"}, {"hash": "a5a25d4e296e0fc253796f3d6694eb2a", "key": "title"}, {"hash": "1716b5fcbb7121af74efdc153d0166c5", "key": "type"}, {"hash": "a792e2393dff1e200b885c5245988f6f", "key": "cvss"}, {"hash": "601892ece72be3be2f57266ca2354792", "key": "bulletinFamily"}, {"hash": "ac06936cb2589085400f48dcc0ce15f1", "key": "modified"}, {"hash": "7d27cc0b810b7e446cc523baffc70577", "key": "href"}], "history": [], "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2004-2116", "id": "CVE-2004-2116", "lastseen": "2017-07-11T11:14:40", "modified": "2017-07-10T21:31:38", "objectVersion": "1.3", "published": "2004-12-31T00:00:00", "references": ["http://packetstormsecurity.com/files/129320/Tiny-Server-1.1.9-Arbitrary-File-Disclosure.html", "http://www.securityfocus.com/bid/9485", "http://www.autistici.org/fdonato/advisory/tinyServer1.1%5B1.0.5%5D-adv.txt", "https://exchange.xforce.ibmcloud.com/vulnerabilities/14927", "https://exchange.xforce.ibmcloud.com/vulnerabilities/99048", "http://marc.info/?l=bugtraq&m=107496530806730&w=2"], "reporter": "NVD", "scanner": [], "title": "CVE-2004-2116", "type": "cve", "viewCount": 0}, "differentElements": ["references", "modified"], "edition": 3, "lastseen": "2017-07-11T11:14:40"}, {"bulletin": {"assessment": {"href": "", "name": "", "system": ""}, "bulletinFamily": "NVD", "cpe": ["cpe:/a:tinyserver:tinyserver:1.1"], "cvelist": ["CVE-2004-2116"], "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:NONE/A:NONE/"}, "description": "Directory traversal vulnerability in Tiny Server 1.1 allows remote attackers to read or download arbitrary files via a .. (dot dot) in the URL.", "edition": 1, "hash": "f0dc661e0bacba6c87090beddeff2b9ee6e04c6134832e88c93094fa3934d5e8", "hashmap": [{"hash": "d41d8cd98f00b204e9800998ecf8427e", "key": "scanner"}, {"hash": "601892ece72be3be2f57266ca2354792", "key": "reporter"}, {"hash": "1b9c64ecd5febc4e671df57ce06a3f59", "key": "cpe"}, {"hash": "56765472680401499c79732468ba4340", "key": "objectVersion"}, {"hash": "90337b14602aea3e39acf0d5a8703074", "key": "description"}, {"hash": "527a59cc7d126ed5ff1ec15bedffcc94", "key": "modified"}, {"hash": "6d3f4796275bb54c21a33b82f399cc6d", "key": "assessment"}, {"hash": "8d01b3f7405442a63e5c8249be351108", "key": "published"}, {"hash": "d2c6e08a65907b8e41599626c2c9a2be", "key": "cvelist"}, {"hash": "a5a25d4e296e0fc253796f3d6694eb2a", "key": "title"}, {"hash": "1716b5fcbb7121af74efdc153d0166c5", "key": "type"}, {"hash": "a792e2393dff1e200b885c5245988f6f", "key": "cvss"}, {"hash": "601892ece72be3be2f57266ca2354792", "key": "bulletinFamily"}, {"hash": "b703de4461b05e9c6b3bbc1e7bc753cc", "key": "references"}, {"hash": "7d27cc0b810b7e446cc523baffc70577", "key": "href"}], "history": [], "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2004-2116", "id": "CVE-2004-2116", "lastseen": "2016-09-03T04:47:16", "modified": "2014-12-06T21:59:12", "objectVersion": "1.2", "published": "2004-12-31T00:00:00", "references": ["http://xforce.iss.net/xforce/xfdb/99048", "http://packetstormsecurity.com/files/129320/Tiny-Server-1.1.9-Arbitrary-File-Disclosure.html", "http://www.securityfocus.com/bid/9485", "http://www.autistici.org/fdonato/advisory/tinyServer1.1%5B1.0.5%5D-adv.txt", "http://xforce.iss.net/xforce/xfdb/14927", "http://marc.theaimsgroup.com/?l=bugtraq&m=107496530806730&w=2"], "reporter": "NVD", "scanner": [], "title": "CVE-2004-2116", "type": "cve", "viewCount": 0}, "differentElements": ["references", "modified"], "edition": 1, "lastseen": "2016-09-03T04:47:16"}, {"bulletin": {"assessment": {"href": "", "name": "", "system": ""}, "bulletinFamily": "NVD", "cpe": ["cpe:/a:tinyserver:tinyserver:1.1"], "cvelist": ["CVE-2004-2116"], "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:NONE/A:NONE/"}, "description": "Directory traversal vulnerability in Tiny Server 1.1 allows remote attackers to read or download arbitrary files via a .. (dot dot) in the URL.", "edition": 2, "enchantments": {}, "hash": "3f9fd2b4c9ed17e30fd467163771039d27a5e792eecc3dfc0dfa623d056f5bcf", "hashmap": [{"hash": "d41d8cd98f00b204e9800998ecf8427e", "key": "scanner"}, {"hash": "601892ece72be3be2f57266ca2354792", "key": "reporter"}, {"hash": "1b9c64ecd5febc4e671df57ce06a3f59", "key": "cpe"}, {"hash": "90337b14602aea3e39acf0d5a8703074", "key": "description"}, {"hash": "6d3f4796275bb54c21a33b82f399cc6d", "key": "assessment"}, {"hash": "8d01b3f7405442a63e5c8249be351108", "key": "published"}, {"hash": "d2c6e08a65907b8e41599626c2c9a2be", "key": "cvelist"}, {"hash": "c4ab06dbdd60470b55e2c00ad3d30780", "key": "modified"}, {"hash": "a5a25d4e296e0fc253796f3d6694eb2a", "key": "title"}, {"hash": "1716b5fcbb7121af74efdc153d0166c5", "key": "type"}, {"hash": "a792e2393dff1e200b885c5245988f6f", "key": "cvss"}, {"hash": "601892ece72be3be2f57266ca2354792", "key": "bulletinFamily"}, {"hash": "d22168d90c3c9813ad62bb438f723fc7", "key": "references"}, {"hash": "7d27cc0b810b7e446cc523baffc70577", "key": "href"}], "history": [], "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2004-2116", "id": "CVE-2004-2116", "lastseen": "2017-04-18T15:50:45", "modified": "2016-10-17T23:06:30", "objectVersion": "1.2", "published": "2004-12-31T00:00:00", "references": ["http://xforce.iss.net/xforce/xfdb/99048", "http://packetstormsecurity.com/files/129320/Tiny-Server-1.1.9-Arbitrary-File-Disclosure.html", "http://www.securityfocus.com/bid/9485", "http://www.autistici.org/fdonato/advisory/tinyServer1.1%5B1.0.5%5D-adv.txt", "http://xforce.iss.net/xforce/xfdb/14927", "http://marc.info/?l=bugtraq&m=107496530806730&w=2"], "reporter": "NVD", "scanner": [], "title": "CVE-2004-2116", "type": "cve", "viewCount": 0}, "differentElements": ["references", "modified"], "edition": 2, "lastseen": "2017-04-18T15:50:45"}], "edition": 4, "hashmap": [{"key": "assessment", "hash": "6d3f4796275bb54c21a33b82f399cc6d"}, {"key": "bulletinFamily", "hash": "601892ece72be3be2f57266ca2354792"}, {"key": "cpe", "hash": "1b9c64ecd5febc4e671df57ce06a3f59"}, {"key": "cvelist", "hash": "d2c6e08a65907b8e41599626c2c9a2be"}, {"key": "cvss", "hash": "a792e2393dff1e200b885c5245988f6f"}, {"key": "description", "hash": "90337b14602aea3e39acf0d5a8703074"}, {"key": "href", "hash": "7d27cc0b810b7e446cc523baffc70577"}, {"key": "modified", "hash": "b2632a410977cd0fb1b3b9aa09ab7609"}, {"key": "published", "hash": "8d01b3f7405442a63e5c8249be351108"}, {"key": "references", "hash": "d08b669f35be52ae91656f3d2ef2b333"}, {"key": "reporter", "hash": "601892ece72be3be2f57266ca2354792"}, {"key": "scanner", "hash": "d41d8cd98f00b204e9800998ecf8427e"}, {"key": "title", "hash": "a5a25d4e296e0fc253796f3d6694eb2a"}, {"key": "type", "hash": "1716b5fcbb7121af74efdc153d0166c5"}], "hash": "79a24699b129ee04c7823b65cbf0c606a789b0e61c7bdc306f11ad3d0d1efaef", "viewCount": 0, "enchantments": {"score": {"value": 5.0, "vector": "NONE", "modified": "2018-08-14T12:14:08"}, "dependencies": {"references": [{"type": "osvdb", "idList": ["OSVDB:3708"]}, {"type": "exploitdb", "idList": ["EDB-ID:23594"]}], "modified": "2018-08-14T12:14:08"}, "vulnersScore": 5.0}, "objectVersion": "1.3", "cpe": ["cpe:/a:tinyserver:tinyserver:1.1"], "assessment": {"href": "", "name": "", "system": ""}, "scanner": []}
{"exploitdb": [{"lastseen": "2016-02-02T21:21:07", "bulletinFamily": "exploit", "description": "TinyServer 1.1 Directory Traversal. CVE-2004-2116. Remote exploit for windows platform", "modified": "2004-01-24T00:00:00", "published": "2004-01-24T00:00:00", "id": "EDB-ID:23594", "href": "https://www.exploit-db.com/exploits/23594/", "type": "exploitdb", "title": "tinyserver 1.1 - Directory Traversal", "sourceData": "source: http://www.securityfocus.com/bid/9485/info\r\n\r\nTinyServer is prone to multiple vulnerabilities.\r\n\r\nA directory traversal issue is present in TinyServer that could allow a remote user to view or download any file to which the server has access.\r\n\r\nA denial of service issue exists due to the failure of the server to check input strings received. Attackers can crash the server by simply sending malformed HTTP GET requests. Sending an HTTP GET request with excessively long data can also cause the server to fail. It is not known if this issue may also result in code execution.\r\n\r\nA cross-site scripting issue is also present in the server. This could allow for theft of cookie-based authentication credentials or other attacks. \r\n\r\nhttp://[host]/../../windows/system.ini", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:NONE/A:NONE/"}, "sourceHref": "https://www.exploit-db.com/download/23594/"}], "osvdb": [{"lastseen": "2017-04-28T13:19:58", "bulletinFamily": "software", "description": "## Vulnerability Description\nTinyServer contains a flaw that may lead to an unauthorized information disclosure. The issue is triggered when a specially crafted URL that contains a \"dot dot\" (../), which will disclose file system and configuration information resulting in a loss of confidentiality.\n## Solution Description\nCurrently, there are no known upgrades, patches, or workarounds available to correct this issue.\n## Short Description\nTinyServer contains a flaw that may lead to an unauthorized information disclosure. The issue is triggered when a specially crafted URL that contains a \"dot dot\" (../), which will disclose file system and configuration information resulting in a loss of confidentiality.\n## Manual Testing Notes\nhttp://vulnserver.com/../../windows/system.ini\n## References:\nVendor URL: http://sourceforge.net/projects/tinyserver/\n[Secunia Advisory ID:10707](https://secuniaresearch.flexerasoftware.com/advisories/10707/)\nOther Advisory URL: http://archives.neohapsis.com/archives/bugtraq/2004-01/0232.html\nISS X-Force ID: 14927\n[CVE-2004-2116](https://vulners.com/cve/CVE-2004-2116)\nBugtraq ID: 9485\n", "modified": "2004-01-26T07:42:36", "published": "2004-01-26T07:42:36", "id": "OSVDB:3708", "href": "https://vulners.com/osvdb/OSVDB:3708", "title": "TinyServer Directory Traversal", "type": "osvdb", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:NONE/A:NONE/"}}]}