Directory traversal vulnerability in GoAhead Web Server 2.1 allows remote attackers to read arbitrary files via a URL with an encoded / (%5C) in a .. (dot dot) sequence. NOTE: it is highly likely that this candidate will be REJECTED because it has been reported to be a duplicate of CVE-2001-0228.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
20 Nov 2024, 23:39
Type | Values Removed | Values Added |
---|---|---|
References | () http://archives.neohapsis.com/archives/vulnwatch/2002-q3/0013.html - Vendor Advisory | |
References | () http://freecode.com/projects/embedthis-goahead-webserver/releases/343539 - | |
References | () http://marc.info/?l=bugtraq&m=102631742711795&w=2 - | |
References | () http://marc.info/?l=bugtraq&m=102709382714597&w=2 - | |
References | () http://osvdb.org/81099 - |
Information
Published : 2002-07-23 04:00
Updated : 2024-11-20 23:39
NVD link : CVE-2002-0680
Mitre link : CVE-2002-0680
CVE.ORG link : CVE-2002-0680
JSON object : View
Products Affected
goahead_software
- goahead_webserver
montavista_software
- hard_hat_linux
orange_software
- orange_web_server
CWE