VID |
22397 |
Severity |
30 |
Port |
80, ... |
Protocol |
TCP |
Class |
WWW |
Detailed Description |
The RaidenHTTPD, according to its banner, has a remote script disclosure vulnerability. RaidenHTTPD is a full featured web server for Microsoft Windows operating systems. RaidenHTTPD version 1.1.47 and earlier versions are vulnerable to remote script disclosure vulnerability. The vulnerability is caused due to a validation error of the filename extension supplied by the user in the URL. This can be exploited to retrieve the source code of script files (e.g. PHP) from the server via specially crafted requests containing dot, space and slash characters.
* Note: This check solely relied on the banner of the remote HTTP server to assess this vulnerability, so this might be a false positive.
* References: http://secunia.com/secunia_research/2006-15/advisory/ http://secunia.com/advisories/19032/ http://forum.raidenftpd.com/showflat.php?Cat=&Board=httpd&Number=47234
* Platforms Affected: RaidenHTTPD Team, RaidenHTTPD version 1.1.47 and earlier versions Microsoft Windows Any version |
Recommendation |
Upgrade to the latest version of RaidenHTTPD (1.1.48 or later), available from the RaidenHTTPD Download Web page at http://www.raidenhttpd.com/en/download.html |
Related URL |
CVE-2006-0949 (CVE) |
Related URL |
16934 (SecurityFocus) |
Related URL |
25037 (ISS) |
|