The SEDUM web server permits intruders to access files outside the web root.
The SEDUM Web Server permits intruders to access files outside the web root using a GET request containing ".." (dot dot). This can expose files (including files with sensitive information) to exposure by unauthorized individuals.
Intruders can read files accessible to the SEDUM web server they should not be able to read .
The CERT/CC is currently unaware of a practical solution to this problem.
Our thanks to Joe Testa, who originally reported this problem on BugTraq.
This document was written by Shawn V. Hernan.
|Date First Published:||2001-05-16|
|Date Last Updated:||2001-06-26 02:52 UTC|