Vulnerabilities > CVE-2002-0680
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Directory traversal vulnerability in GoAhead Web Server 2.1 allows remote attackers to read arbitrary files via a URL with an encoded / (%5C) in a .. (dot dot) sequence. NOTE: it is highly likely that this candidate will be REJECTED because it has been reported to be a duplicate of CVE-2001-0228.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 5 | |
Application | 1 | |
OS | 1 |
Exploit-Db
description | GoAhead WebServer 2.1.x URL Encoded Slash Directory Traversal Vulnerability. CVE-2002-0680. Remote exploit for windows platform |
id | EDB-ID:21607 |
last seen | 2016-02-02 |
modified | 2002-07-10 |
published | 2002-07-10 |
reporter | Matt Moore |
source | https://www.exploit-db.com/download/21607/ |
title | GoAhead WebServer 2.1.x URL Encoded Slash Directory Traversal Vulnerability |
References
- http://archives.neohapsis.com/archives/vulnwatch/2002-q3/0013.html
- http://archives.neohapsis.com/archives/vulnwatch/2002-q3/0013.html
- http://freecode.com/projects/embedthis-goahead-webserver/releases/343539
- http://freecode.com/projects/embedthis-goahead-webserver/releases/343539
- http://marc.info/?l=bugtraq&m=102631742711795&w=2
- http://marc.info/?l=bugtraq&m=102631742711795&w=2
- http://marc.info/?l=bugtraq&m=102709382714597&w=2
- http://marc.info/?l=bugtraq&m=102709382714597&w=2
- http://osvdb.org/81099
- http://osvdb.org/81099