Lucene search

K
exploitdbJoetestaEDB-ID:20616
HistoryFeb 07, 2001 - 12:00 a.m.

soft lite serverworx 3.0 - Directory Traversal

2001-02-0700:00:00
joetesta
www.exploit-db.com
24

7.4 High

AI Score

Confidence

Low

0 Low

EPSS

Percentile

0.0%

source: https://www.securityfocus.com/bid/2346/info

It is possible for a remote user to gain read access to directories and files outside the root directory of ServerWorx. Requesting a specially crafted URL composed of '../' or '.../' sequences will disclose an arbitrary directory. 

http://target/../[file outside web root]

http://target/.../[file outside web root] 

7.4 High

AI Score

Confidence

Low

0 Low

EPSS

Percentile

0.0%