Roxen Web Server /%00/ Encoded Request Forced Directory Listing

This script is Copyright (C) 2000-2011 Tenable Network Security, Inc.


Synopsis :

The remote web server is affected by an information disclosure
vulnerability.

Description :

Requesting a URL with '/%00/' appended to it makes some Roxen servers
dump the listing of the page directory, thus showing potentially
sensitive files.

An attacker may also use this flaw to view the source code of RXML
files, Pike scripts or CGIs.

Under some circumstances, information protected by .htaccess files might
be revealed.

Solution :

Upgrade to the latest version of Roxen.

Risk factor :

Medium / CVSS Base Score : 5.0
(CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N)
CVSS Temporal Score : 4.2
(CVSS2#E:U/RL:U/RC:ND)

Family: Web Servers

Nessus Plugin ID: 10479 ()

Bugtraq ID: 1510

CVE ID: CVE-2000-0671

Ready to Scan Unlimited IPs & Run Compliance Checks?

Upgrade to Nessus Professional today!

Buy Now

Combine the Power of Nessus with the Ease of Cloud

Start your free Nessus Cloud trial now!

Begin Free Trial