header-logo
Suggest Exploit
vendor:
BusyBox httpd
by:
SecurityFocus
7.5
CVSS
HIGH
Directory Traversal
22
CWE
Product Name: BusyBox httpd
Affected Version From: 01.01
Affected Version To: 01.01
Patch Exists: YES
Related CWE: N/A
CPE: a:busybox:busybox
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2006

BusyBox httpd Directory Traversal Vulnerability

The httpd daemon of BusyBox is prone to a directory-traversal vulnerability because it fails to properly sanitize user-supplied input. An attacker can exploit this vulnerability to retrieve arbitrary files from the vulnerable system in the context of the affected application. Information obtained may aid in further attacks.

Mitigation:

Input validation should be used to prevent directory traversal attacks.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/20067/info

The httpd daemon of BusyBox is prone to a directory-traversal vulnerability because it fails to properly sanitize user-supplied input. 

An attacker can exploit this vulnerability to retrieve arbitrary files from the vulnerable system in the context of the affected application. Information obtained may aid in further attacks.

This issue affects version 1.01; other versions may also be vulnerable.

http://www.example.com//%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/etc/passwd