Summary
httpdASM is prone to a directory-traversal vulnerability because it fails to sufficiently sanitize user-supplied input.
A remote attacker may leverage this issue to retrieve arbitrary files in the context of the affected application, potentially revealing sensitive information that may lead to other attacks.
httpdASM 0.92 is vulnerable
other versions may also be affected.
References
Severity
Classification
-
CVSS Base Score: 5.0
AV:N/AC:L/Au:N/C:P/I:N/A:N
Related Vulnerabilities
- Boa Webserver Terminal Escape Sequence in Logs Command Injection Vulnerability
- Kolibri Webserver 'HEAD' Request Processing Buffer Overflow Vulnerability
- LiteSpeed Web Server Source Code Information Disclosure Vulnerability
- IBM WebSphere Application Server Administration Console DoS vulnerability
- Cross-Site Scripting in Cherokee Error Pages