Description
Directory traversal vulnerability in GoAhead web server 2.1 and earlier allows remote attackers to read arbitrary files via a .. attack in an HTTP GET request.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by Sergey Nenashev · textremotewindows
https://www.exploit-db.com/exploits/20607
References (3)
Core 3
Core References
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://osvdb.org/81099
Patch, Vendor Advisory mailing-list
x_refsource_bugtraq
http://archives.neohapsis.com/archives/bugtraq/2001-02/0022.html
Release Notes x_refsource_confirm
http://freecode.com/projects/embedthis-goahead-webserver/releases/343539
Scores
EPSS
0.0525
EPSS Percentile
90.1%
Details
Status
published
Products (2)
goahead_software/goahead_webserver
v.2.0
goahead_software/goahead_webserver
v.2.1
Published
May 03, 2001
Tracked Since
Feb 18, 2026