Description
Charles Steinkuehler sh-httpd 0.3 and 0.4 allows remote attackers to read files or execute arbitrary CGI scripts via a GET request that contains an asterisk (*) wildcard character.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by dong-h0un U · textremotelinux
https://www.exploit-db.com/exploits/23295
References (4)
Core 4
Core References
Patch mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/342766
Exploit, Patch, Vendor Advisory vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/8897
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/13519
Exploit, Patch, Vendor Advisory mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/342473
Scores
EPSS
0.0647
EPSS Percentile
91.1%
Details
Status
published
Products (2)
charles_steinkuehler/sh-httpd
0.3
charles_steinkuehler/sh-httpd
0.4
Published
Oct 27, 2003
Tracked Since
Feb 18, 2026