9 lines
No EOL
524 B
Text
9 lines
No EOL
524 B
Text
source: https://www.securityfocus.com/bid/20067/info
|
|
|
|
The httpd daemon of BusyBox is prone to a directory-traversal vulnerability because it fails to properly sanitize user-supplied input.
|
|
|
|
An attacker can exploit this vulnerability to retrieve arbitrary files from the vulnerable system in the context of the affected application. Information obtained may aid in further attacks.
|
|
|
|
This issue affects version 1.01; other versions may also be vulnerable.
|
|
|
|
http://www.example.com//%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/etc/passwd |