Description
Directory traversal vulnerability in Xerver HTTP Server 4.32 allows remote attackers to read arbitrary files via a full pathname with a drive letter in the currentPath parameter in a chooseDirectory action.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by Stack · textremotemultiple
https://www.exploit-db.com/exploits/9718
References (1)
Core 1
Core References
Exploit, Third Party Advisory exploit
x_refsource_exploit-db
http://www.exploit-db.com/exploits/9718
Scores
EPSS
0.0110
EPSS Percentile
78.1%
Details
CWE
CWE-22
Status
published
Products (1)
xerver/xerver
4.32
Published
Oct 05, 2009
Tracked Since
Feb 18, 2026