CVE-2002-0680

Directory traversal vulnerability in GoAhead Web Server 2.1 allows remote attackers to read arbitrary files via a URL with an encoded / (%5C) in a .. (dot dot) sequence. NOTE: it is highly likely that this candidate will be REJECTED because it has been reported to be a duplicate of CVE-2001-0228.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:goahead_software:goahead_webserver:2.1.1:*:*:*:*:*:*:*
cpe:2.3:a:goahead_software:goahead_webserver:2.1.2:*:*:*:*:*:*:*
cpe:2.3:a:goahead_software:goahead_webserver:2.1.3:*:*:*:*:*:*:*
cpe:2.3:a:goahead_software:goahead_webserver:2.1.4:*:*:*:*:*:*:*
cpe:2.3:a:goahead_software:goahead_webserver:2.1.5:*:*:*:*:*:*:*
cpe:2.3:a:orange_software:orange_web_server:2.1:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:montavista_software:hard_hat_linux:1.0:*:*:*:*:*:*:*

History

20 Nov 2024, 23:39

Type Values Removed Values Added
References () http://archives.neohapsis.com/archives/vulnwatch/2002-q3/0013.html - Vendor Advisory () http://archives.neohapsis.com/archives/vulnwatch/2002-q3/0013.html - Vendor Advisory
References () http://freecode.com/projects/embedthis-goahead-webserver/releases/343539 - () http://freecode.com/projects/embedthis-goahead-webserver/releases/343539 -
References () http://marc.info/?l=bugtraq&m=102631742711795&w=2 - () http://marc.info/?l=bugtraq&m=102631742711795&w=2 -
References () http://marc.info/?l=bugtraq&m=102709382714597&w=2 - () http://marc.info/?l=bugtraq&m=102709382714597&w=2 -
References () http://osvdb.org/81099 - () http://osvdb.org/81099 -

Information

Published : 2002-07-23 04:00

Updated : 2024-11-20 23:39


NVD link : CVE-2002-0680

Mitre link : CVE-2002-0680

CVE.ORG link : CVE-2002-0680


JSON object : View

Products Affected

goahead_software

  • goahead_webserver

montavista_software

  • hard_hat_linux

orange_software

  • orange_web_server