CVE-2004-2565

Sambar Server 6.1 Beta 2 - Path Traversal

Title source: llm
STIX 2.1

Description

Multiple directory traversal vulnerabilities in Sambar Server 6.1 Beta 2 on Windows, and possibly other versions on Linux, when the administrative IP address restrictions have been modified from the default, allow remote authenticated users to read arbitrary files via (1) a "..\" (dot dot backslash) in the file parameter to showini.asp, or (2) an absolute path with drive letter in the log parameter to showlog.asp.

Exploits (1)

exploitdb WRITEUP VERIFIED
by Oliver Karow · textremotewindows
https://www.exploit-db.com/exploits/24163

References (6)

Core 6
Core References
Exploit, Vendor Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/11748
Exploit vdb-entry x_refsource_sectrack
http://securitytracker.com/id?1010353
Exploit vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/10444
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/16287
Exploit vdb-entry x_refsource_osvdb
http://www.osvdb.org/6585

Scores

EPSS 0.0765
EPSS Percentile 91.9%

Details

Status published
Products (1)
sambar/sambar_server 6.1 beta2
Published Dec 31, 2004
Tracked Since Feb 18, 2026