Computalynx CProxy 3.3/3.4.x - Directory Traversal
Author: Kristof Philipsen
type: remote
platform: windows
port:
date_added: 2005-03-03
date_updated: 2013-05-04
verified: 1
codes:
tags:
aliases:
screenshot_url:
application_url:
source: https://www.securityfocus.com/bid/12722/info
CProxy is reported prone to a remote directory traversal vulnerability. This issue arises due to insufficient sanitization of user-supplied data. A remote user may exploit this issue to disclose arbitrary files and carry out a denial of service condition.
It is reported that an attacker can simply issue an HTTP GET request including directory traversal sequences to carry out this attack.
GET http://../../[file] HTTP/1.0