Description
Directory traversal vulnerability in HServer 0.1.1 allows remote attackers to read arbitrary files via a (1) ..%5c (dot dot encoded backslash) or (2) %2e%2e%5c (encoded dot dot backslash) in the PATH_INFO.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by demonalex · textremotewindows
https://www.exploit-db.com/exploits/36500
References (3)
Core 3
Core References
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/72138
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/51286
Exploit mailing-list
x_refsource_bugtraq
http://archives.neohapsis.com/archives/bugtraq/2012-01/0028.html
Scores
EPSS
0.0745
EPSS Percentile
91.8%
Details
CWE
CWE-22
Status
published
Products (1)
luizpicanco/hserver
0.1.1
Published
Sep 23, 2012
Tracked Since
Feb 18, 2026