Description
Directory traversal vulnerability in Cherokee Web Server 0.5.4 and earlier for Windows allows remote attackers to read arbitrary files via a /\.. (slash backslash dot dot) in the URL.
Exploits (1)
References (7)
Core 7
Core References
Exploit vdb-entry
x_refsource_osvdb
http://osvdb.org/59588
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/37183
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/36874
Exploit, URL Repurposed x_refsource_misc
http://freetexthost.com/ncyss3plli
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/54024
Vendor Advisory vdb-entry
x_refsource_vupen
http://www.vupen.com/english/advisories/2009/3091
Exploit x_refsource_misc
http://pocoftheday.blogspot.com/2009/10/cherokee-web-server-054-directory.html
Scores
EPSS
0.0727
EPSS Percentile
91.7%
Details
CWE
CWE-22
Status
published
Products (1)
cherokee/cherokee_httpd
0.5.4
Published
Nov 06, 2009
Tracked Since
Feb 18, 2026