Lucene search

K
exploitdbJoe TestaEDB-ID:20608
HistoryFeb 04, 2001 - 12:00 a.m.

Guido Frassetto SEDUM HTTP Server 2.0 - Directory Traversal

2001-02-0400:00:00
Joe Testa
www.exploit-db.com
22

AI Score

7.4

Confidence

Low

source: https://www.securityfocus.com/bid/2335/info

A remote user could gain read access to known files outside of the root directory in a SEDUM HTTP Server. Requesting a specially crafted URL composed of '../' or '.../' sequences will disclose the requested file.

http://target/../[file outside web root]

http://target/.../[file outside web root] 

AI Score

7.4

Confidence

Low

Related for EDB-ID:20608