发布时间 :2001-06-27 00:00:00
修订时间 :2017-10-09 21:29:44

[原文]Directory traversal vulnerability in RobTex Viking Web server before 1.07-381 allows remote attackers to read arbitrary files via a \... (modified dot dot) in an HTTP URL request.

[CNNVD]RobTex Viking Web服务器目录遍历漏洞(CNNVD-200106-122)

        RobTex Viking Web服务器1.07-381之前版本存在目录遍历漏洞。远程攻击者可以借助HTTP URL请求中的\...(修改过的点 点)读取任意文件。

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)


- OVAL (用于检测的技术细节)


- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD
(官方数据源) CNNVD

- 其它链接及资源
(VENDOR_ADVISORY)  BUGTRAQ  20010423 Vulnerability in Viking Web Server
(UNKNOWN)  XF  viking-dot-directory-traversal(6450)

- 漏洞信息

RobTex Viking Web服务器目录遍历漏洞
中危 路径遍历
2001-06-27 00:00:00 2005-05-02 00:00:00
        RobTex Viking Web服务器1.07-381之前版本存在目录遍历漏洞。远程攻击者可以借助HTTP URL请求中的\...(修改过的点 点)读取任意文件。

- 公告与补丁


- 漏洞信息 (20793)

RobTex Viking Server 1.0.7 Relative Path Webroot Escaping Vulnerability (EDBID:20793)
windows remote
2001-04-23 Verified
0 joetesta
N/A [点击下载]

The Viking Server is a freely available software package maintained and distributed by Robtex. The Viking Server provides multiple protocol service on Windows 95, 98, and NT systems.

A problem in the software package could make it possible for remote users to gain access to sensitive system files. Due to the improper handling of relative paths by the HTTP serving portion of the Viking Server, a user requesting a relative path such as "\...\" can gain access to the root directory, breaking out of the webroot.

This problem makes it possible for remote user to gain access to sensitive system files, and potentially local access. 


- 漏洞信息

Viking Web Server Traversal Arbitrary File Access
Remote / Network Access Information Disclosure, Input Manipulation
Loss of Confidentiality Upgrade
Exploit Public Vendor Verified

- 漏洞描述

- 时间线

2001-04-23 Unknow
Unknow Unknow

- 解决方案

Upgrade to version 1.0.7-382 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者

Unknown or Incomplete