Vulnerability Description
Directory traversal vulnerability in Aprelium Abyss Web Server (abyssws) before 1.0.0.2 allows remote attackers to read files outside the web root, including the abyss.conf file, via URL-encoded .. (dot dot) sequences in the HTTP request.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Aprelium Technologies | Abyss Web Server | 1.0 |
References
- http://archives.neohapsis.com/archives/bugtraq/2002-04/0110.htmlExploitPatchVendor Advisory
- http://www.aprelium.com/forum/viewtopic.php?t=24Patch
- http://www.iss.net/security_center/static/8805.phpPatchVendor Advisory
- http://www.securityfocus.com/bid/4466ExploitPatchVendor Advisory
- http://archives.neohapsis.com/archives/bugtraq/2002-04/0110.htmlExploitPatchVendor Advisory
- http://www.aprelium.com/forum/viewtopic.php?t=24Patch
- http://www.iss.net/security_center/static/8805.phpPatchVendor Advisory
- http://www.securityfocus.com/bid/4466ExploitPatchVendor Advisory
FAQ
What is CVE-2002-0543?
CVE-2002-0543 is a vulnerability with a CVSS score of 5.0 (MEDIUM). Directory traversal vulnerability in Aprelium Abyss Web Server (abyssws) before 1.0.0.2 allows remote attackers to read files outside the web root, including the abyss.conf file, via URL-encoded .. (d...
How severe is CVE-2002-0543?
CVE-2002-0543 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2002-0543?
Check the references section above for vendor advisories and patch information. Affected products include: Aprelium Technologies Abyss Web Server.