[原文]Directory traversal vulnerability in Pegasi Web Server (PWS) 0.2.2 allows remote attackers to read files outside of the web root via a .. (dot dot) directly after the initial '/' (slash) in the URI.
Pegasi Web Server (PWS) 0.2.2版本存在目录遍历漏洞。远程攻击者借助URI中初始的'/' (斜线)之后的..(点 点）目录读取Web根目录以外的文件。
The vendor has released an update to address the issues described in this BID. Users who are potentially affected are advised to apply this upgrade as soon as possible. Pegasi Web Server Pegasi Web Server 0.2.2
Multiple vulnerabilities have been identified in the application that may allow a remote attacker to carry out directory traversal and cross-site scripting attacks. A successful cross-site scripting attack may make it possible for an attacker to create a malicious link to a vulnerable site that includes hostile HTML and script code. This code may be rendered in the browser of a victim user who visits the malicious link and this will occur in the security context of the site hosting the software. The directory traversal vulnerability may allow a malicious user to request files outside of the web-server root directory with directory traversal strings such as '../'.
Pegasi Web Server version 0.2.2 has been reported to be prone to these issues, however, it is possible that other versions are affected as well.
Pegasi Web Server contains a flaw that allows a remote attacker to access arbitrary files outside of the web path. The issue is due to the server not properly sanitizing user input, specifically traversal style attacks (../../) supplied via the URI.
Upgrade to version 0.2.3 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.