Lucene search

K
exploitdbKiborgEDB-ID:19753
HistoryJan 17, 1996 - 12:00 a.m.

Microsoft FrontPage Personal Web Server 1.0/4.0 - Directory Traversal

1996-01-1700:00:00
kiborg
www.exploit-db.com
41

AI Score

7.4

Confidence

Low

source: https://www.securityfocus.com/bid/989/info

Microsoft's Personal Web Server and Front Page Personal Web Server will follow '/..../' strings in requested URLs, allowing remote users to obtain unauthenticated read access to files and directories on the same logical drive as the web content. Hidden files are viewable via this method, although the Front Page directory itself is not. The name and path of the desired file must be known to the attacker.

Note that while these programs support Windows 95, 98 and NT, only the Win9x versions are vulnerable. 

http://target/..../directory/filename.ext 

AI Score

7.4

Confidence

Low

Related for EDB-ID:19753