|Category:||Web application abuses|
|Title:||OmniPro HTTPd 2.08 scripts source full disclosure|
|Summary:||OmniPro HTTPd 2.08 suffers from a security vulnerability that permits;malicious users to get the full source code of scripting files.|
OmniPro HTTPd 2.08 suffers from a security vulnerability that permits
malicious users to get the full source code of scripting files.
By appending an ASCII/Unicode space char '%20' at the script suffix,
the web server will no longer interpret it and rather send it back clearly
as a simple document to the user in the same manner as it usually does to
process HTML-like files.
The flaw does not work with files located in CGI directories (e.g cgibin,
Exploit: GET /test.php%20 HTTP/1.0
Up to release 2.08
No known solution was made available for at least one year since the disclosure of this vulnerability.
Likely none will be provided anymore. General solution options are to upgrade to a newer release, disable respective features, remove the
product or replace the product by another one.
BugTraq ID: 2788|
Common Vulnerability Exposure (CVE) ID: CVE-2001-0778
Bugtraq: 20010525 Remote vulnerabilities in OmniHTTPd (Google Search)
XForce ISS Database: omnihttpd-reveal-source-code(6621)
|Copyright||Copyright (C) 2001 INTRANODE|
|This is only one of 73533 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.