The product accepts path input in the form of single dot directory exploit ('/./') without appropriate validation, which can lead to ambiguous path resolution and allow an attacker to traverse the file system to unintended locations or access arbitrary files.
N/A
Threat Mapped score: 0.0
Industry: Finiancial
Threat priority: Unclassified
CVE: CVE-2000-0004
Server allows remote attackers to read source code for executable files by inserting a . (dot) into the URL.
CVE: CVE-2002-0304
Server allows remote attackers to read password-protected files via a /./ in the HTTP request.
CVE: CVE-1999-1083
Possibly (could be a cleansing error)
CVE: CVE-2004-0815
"/./////etc" cleansed to ".///etc" then "/etc"
CVE: CVE-2002-0112
Server allows remote attackers to view password protected files via /./ in the URL.
N/A
N/A
Phase | Note |
---|---|
Implementation | N/A |
N/A