header-logo
Suggest Exploit
vendor:
SimpleWebserver
by:
SecurityFocus
7.5
CVSS
HIGH
Directory Traversal
22
CWE
Product Name: SimpleWebserver
Affected Version From: 2.13.31027 build 3289
Affected Version To: 2.13.31027 build 3289
Patch Exists: YES
Related CWE: N/A
CPE: a:telcondex:simplewebserver
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2002

SimpleWebserver Directory Traversal Vulnerability

It has been reported that SimpleWebserver may be prone to a directory traversal vulnerability that may allow an attacker to gain access to sensitive information. The issue presents itself due to insufficient sanitization of user-supplied input. An attacker may traverse outside the server root directory by using '.../' character sequences.

Mitigation:

Input validation should be used to ensure that user-supplied input is properly sanitized.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/8998/info

It has been reported that SimpleWebserver may be prone to a directory traversal vulnerability that may allow an attacker to gain access to sensitive information. The issue presents itself due to insufficient sanitization of user-supplied input. An attacker may traverse outside the server root directory by using '.../' character sequences.

TelCondex SimpleWebserver version 2.13.31027 build 3289 is reported to be prone to this issue, however other versions may be affected as well.

http://www.example.com/.../.../test.txt