First published: Fri Mar 09 2001(Updated: )
Directory traversal vulnerability in GoAhead web server 2.1 and earlier allows remote attackers to read arbitrary files via a .. attack in an HTTP GET request.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Goahead Webserver | =v.2.0 | |
Goahead Webserver | =v.2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2001-0228 has a medium severity rating due to its ability to allow unauthorized file access.
The best way to fix CVE-2001-0228 is to upgrade to a patched version of the GoAhead web server that addresses this vulnerability.
CVE-2001-0228 affects GoAhead web server versions 2.0 and 2.1.
Yes, CVE-2001-0228 can be exploited remotely using a directory traversal attack.
CVE-2001-0228 is associated with a directory traversal attack that allows attackers to read arbitrary files.