[] NeoSense

Computalynx CProxy 3.3/3.4.x - Directory Traversal

Author: Kristof Philipsen
type: remote
platform: windows
port: 
date_added: 2005-03-03 
date_updated: 2013-05-04 
verified: 1 
codes:  
tags: 
aliases:  
screenshot_url:  
application_url: 

source: https://www.securityfocus.com/bid/12722/info

CProxy is reported prone to a remote directory traversal vulnerability. This issue arises due to insufficient sanitization of user-supplied data. A remote user may exploit this issue to disclose arbitrary files and carry out a denial of service condition.

It is reported that an attacker can simply issue an HTTP GET request including directory traversal sequences to carry out this attack.

GET http://../../[file] HTTP/1.0