Summary
The remote host is running a version of RaidenHTTPD which is vulnerable to a remote directory traversal bug. An attacker exploiting this bug would be able to gain access to potentially confidential material outside of the web root.
Solution
Upgrade to RaidenHTTPD version 1.1.31
Severity
Classification
-
CVSS Base Score: 7.8
AV:N/AC:L/Au:N/C:C/I:N/A:N
Related Vulnerabilities
- AstroSPACES profile.php SQL Injection Vulnerability
- Apache Struts ClassLoader Manipulation Vulnerabilities
- AlienVault OSSIM 'date_from' Parameter Multiple SQL Injection Vulnerabilities
- Apple Safari RSS Feed Information Disclosure Vulnerability
- Alcatel-Lucent OmniPCX Enterprise Remote Command Execution Vulnerability