Summary
httpdASM is prone to a directory-traversal vulnerability because it fails to sufficiently sanitize user-supplied input.
A remote attacker may leverage this issue to retrieve arbitrary files in the context of the affected application, potentially revealing sensitive information that may lead to other attacks.
httpdASM 0.92 is vulnerable
other versions may also be affected.
References
Severity
Classification
-
CVSS Base Score: 5.0
AV:N/AC:L/Au:N/C:P/I:N/A:N
Related Vulnerabilities
- Home Web Server Graphical User Interface Remote Denial Of Service Vulnerability
- Ecava IntegraXor Account Information Disclosure Vulnerability
- Apache Tomcat 'sort' and 'orderBy' Parameters Cross Site Scripting Vulnerabilities
- IBM WebSphere Application Server JNDI information disclosure Vulnerability
- Cherokee Terminal Escape Sequence in Logs Command Injection Vulnerability