Description
Directory traversal vulnerability in Accipiter Direct Server 6.0 allows remote attackers to read arbitrary files via encoded \.. (backslash .., "%5c%2e%2e") sequences in an HTTP request.
Exploits (1)
exploitdb
WRITEUP
VERIFIED
by Mark Bassett · textremotewindows
https://www.exploit-db.com/exploits/23533
References (6)
Core 6
Core References
Exploit, Patch, Vendor Advisory vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/9389
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/14198
Mailing List mailing-list
x_refsource_bugtraq
http://marc.info/?l=bugtraq&m=107392576215418&w=2
Third Party Advisory mailing-list
x_refsource_fulldisc
http://archives.neohapsis.com/archives/fulldisclosure/2004-01/0274.html
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://www.osvdb.org/3433
Third Party Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/10600
Scores
EPSS
0.0466
EPSS Percentile
89.4%
Details
Status
published
Products (1)
accipiter/accipiter_direct_server
6.0
Published
Feb 17, 2004
Tracked Since
Feb 18, 2026