Directory traversal vulnerability in GoAhead Web Server 2.1 allows remote attackers to read arbitrary files via a URL with an encoded / (%5C) in a .. (dot dot) sequence. NOTE: it is highly likely that this candidate will be REJECTED because it has been reported to be a duplicate of CVE-2001-0228.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Goahead_webserver | Goahead_software | 2.1.1 (including) | 2.1.1 (including) |
Goahead_webserver | Goahead_software | 2.1.2 (including) | 2.1.2 (including) |
Goahead_webserver | Goahead_software | 2.1.3 (including) | 2.1.3 (including) |
Goahead_webserver | Goahead_software | 2.1.4 (including) | 2.1.4 (including) |
Goahead_webserver | Goahead_software | 2.1.5 (including) | 2.1.5 (including) |
Orange_web_server | Orange_software | 2.1 (including) | 2.1 (including) |