[] NeoSense

soft lite serverworx 3.0 - Directory Traversal

Author: joetesta
type: remote
platform: windows
port: 
date_added: 2001-02-07 
date_updated: 2012-08-18 
verified: 1 
codes: CVE-2001-0206;OSVDB-7702 
tags: 
aliases:  
screenshot_url:  
application_url: 

source: https://www.securityfocus.com/bid/2346/info

It is possible for a remote user to gain read access to directories and files outside the root directory of ServerWorx. Requesting a specially crafted URL composed of '../' or '.../' sequences will disclose an arbitrary directory.

http://target/../[file outside web root]

http://target/.../[file outside web root]