|
Family: CGI abuses --> Category: attack
AnalogX web server traversal Vulnerability Scan
Vulnerability Scan Summary %2E%2E/%2E%2E/file.txt
Detailed Explanation for this Vulnerability Test
It is possible to read arbitrary files on
the remote server by prepending %2E%2E/%2E%2E/
in front of the file name sent as a URL string to the
remote web server.
Solution : If you are using AnalogX SimpleServer:www,
upgrade to the latest version. If you are using another web
server, contact your vendor for a patch.
Threat Level: High
Click HERE for more information and discussions on this network vulnerability scan.
|