Description
Peter Sandvik's Simple Web Server 0.5.1 and earlier allows remote attackers to bypass access restrictions for files via an HTTP request with a sequence of multiple / (slash) characters such as http://www.example.com///file/.
Exploits (1)
exploitdb
WRITEUP
VERIFIED
by Tamer Sahin · textremotewindows
https://www.exploit-db.com/exploits/22001
References (5)
Core 5
Core References
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/6145
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/10563
Third Party Advisory mailing-list
x_refsource_vulnwatch
http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0065.html
Mailing List mailing-list
x_refsource_bugtraq
http://marc.info/?l=bugtraq&m=103679016031857&w=2
Exploit, Vendor Advisory x_refsource_misc
http://www.idefense.com/advisory/11.08.02a.txt
Scores
EPSS
0.0467
EPSS Percentile
89.4%
Details
Status
published
Products (1)
peter_sandvik/simple_web_server
< 0.5.1
Published
Nov 12, 2002
Tracked Since
Feb 18, 2026