Description
db4web_c and db4web_c.exe programs in DB4Web 3.4 and 3.6 allow remote attackers to read arbitrary files via an HTTP request whose argument is a filename of the form (1) C: (drive letter), (2) //absolute/path (double-slash), or (3) .. (dot-dot).
Exploits (1)
exploitdb
WRITEUP
VERIFIED
by Stefan Bagdohn · textremotemultiple
https://www.exploit-db.com/exploits/21800
References (5)
Core 5
Core References
Patch, Vendor Advisory vdb-entry
x_refsource_xf
http://www.iss.net/security_center/static/10123.php
Various Sources x_refsource_confirm
http://www.db4web.de/download/homepage/hotfix/readme_en.txt
Vendor Advisory mailing-list
x_refsource_bugtraq
http://archives.neohapsis.com/archives/bugtraq/2002-09/0197.html
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/5723
Vendor Advisory mailing-list
x_refsource_vulnwatch
http://archives.neohapsis.com/archives/vulnwatch/2002-q3/0124.html
Scores
EPSS
0.0511
EPSS Percentile
89.9%
Details
Status
published
Products (2)
db4web/db4web
3.4
db4web/db4web
3.6
Published
Apr 22, 2003
Tracked Since
Feb 18, 2026