Korean
<< Back
VID 22397
Severity 30
Port 80, ...
Protocol TCP
Class WWW
Detailed Description The RaidenHTTPD, according to its banner, has a remote script disclosure vulnerability. RaidenHTTPD is a full featured web server for Microsoft Windows operating systems. RaidenHTTPD version 1.1.47 and earlier versions are vulnerable to remote script disclosure vulnerability. The vulnerability is caused due to a validation error of the filename extension supplied by the user in the URL. This can be exploited to retrieve the source code of script files (e.g. PHP) from the server via specially crafted requests containing dot, space and slash characters.

* Note: This check solely relied on the banner of the remote HTTP server to assess this vulnerability, so this might be a false positive.

* References:
http://secunia.com/secunia_research/2006-15/advisory/
http://secunia.com/advisories/19032/
http://forum.raidenftpd.com/showflat.php?Cat=&Board=httpd&Number=47234

* Platforms Affected:
RaidenHTTPD Team, RaidenHTTPD version 1.1.47 and earlier versions
Microsoft Windows Any version
Recommendation Upgrade to the latest version of RaidenHTTPD (1.1.48 or later), available from the RaidenHTTPD Download Web page at http://www.raidenhttpd.com/en/download.html
Related URL CVE-2006-0949 (CVE)
Related URL 16934 (SecurityFocus)
Related URL 25037 (ISS)