Description
DiGi Web Server allows remote attackers to cause a denial of service (CPU consumption) via an HTTP GET request that contains a large number of / (slash) characters, which consumes resources when DiGi converts the slashes to \ (backslash) characters.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by Donato Ferrante · textdosmultiple
https://www.exploit-db.com/exploits/24066
References (8)
Core 8
Core References
Exploit, Patch, Vendor Advisory vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/10228
Patch, Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/11490
Exploit, Patch, Vendor Advisory vdb-entry
x_refsource_osvdb
http://www.osvdb.org/5702
Mailing List mailing-list
x_refsource_bugtraq
http://marc.info/?l=bugtraq&m=108311170018203&w=2
Patch x_refsource_confirm
http://sourceforge.net/project/shownotes.php?release_id=234261
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/15987
Third Party Advisory, VDB Entry vdb-entry
x_refsource_sectrack
http://securitytracker.com/alerts/2004/Apr/1009957.html
Vendor Advisory x_refsource_misc
http://www.autistici.org/fdonato/advisory/DiGiWwwServerC1-adv.txt
Scores
EPSS
0.0844
EPSS Percentile
92.4%
Details
Status
published
Products (1)
digi/www_server
compieuw (3 CPE variants)
Published
Apr 27, 2004
Tracked Since
Feb 18, 2026