Vulnerabilities > CVE-2002-1483 - Unspecified vulnerability in Db4Web 3.4/3.6
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
db4web_c and db4web_c.exe programs in DB4Web 3.4 and 3.6 allow remote attackers to read arbitrary files via an HTTP request whose argument is a filename of the form (1) C: (drive letter), (2) //absolute/path (double-slash), or (3) .. (dot-dot).
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 2 |
Exploit-Db
description | DB4Web 3.4/3.6 File Disclosure Vulnerability. CVE-2002-1483. Remote exploits for multiple platform |
id | EDB-ID:21800 |
last seen | 2016-02-02 |
modified | 2002-09-17 |
published | 2002-09-17 |
reporter | Stefan Bagdohn |
source | https://www.exploit-db.com/download/21800/ |
title | DB4Web 3.4/3.6 File Disclosure Vulnerability |
Nessus
NASL family | CGI abuses |
NASL id | DB4WEB_DIR_TRAV.NASL |
description | The version of DB4Web running on the remote web server has an directory traversal vulnerability. A remote attacker could use this to read arbitrary files on the server. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 11182 |
published | 2002-12-02 |
reporter | This script is Copyright (C) 2002-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/11182 |
title | DB4Web Server db4web_c Filename Request Traversal Arbitrary File Access |
code |
|
References
- http://archives.neohapsis.com/archives/bugtraq/2002-09/0197.html
- http://archives.neohapsis.com/archives/bugtraq/2002-09/0197.html
- http://archives.neohapsis.com/archives/vulnwatch/2002-q3/0124.html
- http://archives.neohapsis.com/archives/vulnwatch/2002-q3/0124.html
- http://www.db4web.de/download/homepage/hotfix/readme_en.txt
- http://www.db4web.de/download/homepage/hotfix/readme_en.txt
- http://www.iss.net/security_center/static/10123.php
- http://www.iss.net/security_center/static/10123.php
- http://www.securityfocus.com/bid/5723
- http://www.securityfocus.com/bid/5723