CVE-2007-6404 : Detail

CVE-2007-6404

Directory Traversal
A01-Broken Access Control
2.4%V3
Network
2007-12-17
17h00 +00:00
2018-10-15
18h57 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

Directory traversal vulnerability in Sergey Lyubka Simple HTTPD (shttpd) 1.38 and earlier on Windows allows remote attackers to read arbitrary files via a ..\ (dot dot backslash) in the URI.

CVE Informations

Related Weaknesses

CWE-ID Weakness Name Source
CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.

Metrics

Metrics Score Severity CVSS Vector Source
V2 5 AV:N/AC:L/Au:N/C:N/I:P/A:N [email protected]

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Exploit information

Exploit Database EDB-ID : 4700

Publication date : 2007-12-06 23h00 +00:00
Author : Luigi Auriemma
EDB Verified : Yes

####################################################################### Luigi Auriemma Application: Simple HTTPD http://shttpd.sourceforge.net Versions: <= 1.38 Platforms: Windows, *nix, QNX, RTEMS only Windows seems vulnerable Bugs: A] directory traversal B] scripts and CGI viewing/downloading (%20 char found by Shay priel in Jun 2007) Exploitation: remote Date: 07 Dec 2007 Author: Luigi Auriemma e-mail: [email protected] web: aluigi.org ####################################################################### 1) Introduction 2) Bugs 3) The Code 4) Fix ####################################################################### =============== 1) Introduction =============== Simple HTTPD (shttpd) is an open source web server created for embedded systems. ####################################################################### ======= 2) Bugs ======= ---------------------- A] directory traversal ---------------------- Using the "..\" pattern is possible to download any file in the disk on which is located the web root directory. -------------------------------------- B] scripts and CGI viewing/downloading -------------------------------------- Any script or CGI in the server can be viewed/downloaded instead of being executed simply appending the chars '+', '.', %20 (this one reported by Shay priel in the summer 2007), %2e and any other byte (in hex format too) major than 0x7f to the requested filename. Note that only Windows seems vulnerable to the above bugs. ####################################################################### =========== 3) The Code =========== A] http://SERVER/..\..\..\boot.ini http://SERVER/..\%2e%2e%5c..\boot.ini B] http://SERVER/file.php+ http://SERVER/file.php. http://SERVER/file.php%80 http://SERVER/file.php%ff ####################################################################### ====== 4) Fix ====== I have posted the problems in the shttpd-general mailing-list but there is no reply yet: http://sourceforge.net/mailarchive/forum.php?forum_name=shttpd-general ####################################################################### --- Luigi Auriemma http://aluigi.org # milw0rm.com [2007-12-07]

Products Mentioned

Configuraton 0

Microsoft>>Windows >> Version *

Shttp>>Shttp >> Version To (including) 1.38

    References

    http://securityreason.com/securityalert/3457
    Tags : third-party-advisory, x_refsource_SREASON
    http://osvdb.org/44013
    Tags : vdb-entry, x_refsource_OSVDB
    https://www.exploit-db.com/exploits/4700
    Tags : exploit, x_refsource_EXPLOIT-DB
    http://www.securityfocus.com/bid/26768
    Tags : vdb-entry, x_refsource_BID