Guido Frassetto SEDUM HTTP Server 2.0 - Directory Traversal
Author: Joe Testa
type: remote
platform: windows
port:
date_added: 2001-02-04
date_updated: 2012-08-18
verified: 1
codes: CVE-2001-0199;OSVDB-14797
tags:
aliases:
screenshot_url:
application_url:
source: https://www.securityfocus.com/bid/2335/info
A remote user could gain read access to known files outside of the root directory in a SEDUM HTTP Server. Requesting a specially crafted URL composed of '../' or '.../' sequences will disclose the requested file.
http://target/../[file outside web root]
http://target/.../[file outside web root]