CVE-2010-10012

httpdasm 0.92 - Path Traversal

Title source: llm

Description

A path traversal vulnerability exists in httpdasm version 0.92, a lightweight Windows HTTP server, that allows unauthenticated attackers to read arbitrary files on the host system. By sending a specially crafted GET request containing a sequence of URL-encoded backslashes and directory traversal patterns, an attacker can escape the web root and access sensitive files outside of the intended directory.

Exploits (2)

exploitdb WORKING POC VERIFIED
by John Leitch · textremotewindows
https://www.exploit-db.com/exploits/15861
metasploit WORKING POC
by John Leitch, Shelby Pace · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/scanner/http/httpdasm_directory_traversal.rb

Scores

EPSS 0.5804
EPSS Percentile 98.1%

Classification

CWE
CWE-22
Status draft

Timeline

Published Jul 23, 2025
Tracked Since Feb 18, 2026