Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Remote file access >> HTTP Directory Traversal (Windows)


Vulnerability Assessment Details

HTTP Directory Traversal (Windows)

Vulnerability Assessment Summary
thttpd flaw in 2.0.7 windows port

Detailed Explanation for this Vulnerability Assessment

The remote web server is vulnerable to a path traversal vulnerability.

A possible hacker may exploit this flaw to read arbitrary files on the remote
system with the rights of the http process.

Solution : upgrade your web server or change it.
Network Security Threat Level: High

Networks Security ID: 10862

Vulnerability Assessment Copyright: This script is Copyright (C) 2004 David Maciejak

Cables, Connectors

HP Proliant DL380 Server w/ Xeon X5460, 8GB RAM, 1x 500GB SAS HDD
$9.99
HP Proliant DL380 Server w/ Xeon X5460, 8GB RAM, 1x 500GB SAS HDD pictureUSR-CANET200 Industrial CAN to Ethernet RS485 Converter 2 Port CAN Device Server
$75.0
USR-CANET200 Industrial CAN to Ethernet RS485 Converter 2 Port CAN Device Server pictureWindows NT Server and Windows NT 4.0 Option Pack
$22.2
Windows NT Server and Windows NT 4.0 Option Pack pictureUNIX/Sybase Quick Reference Guides - Client Server
$6.99
UNIX/Sybase Quick Reference Guides - Client Server  picture


Discussions

No Discussions have been posted on this vulnerability.