RaidenHTTPD Crafted Request Script Source Disclosure

This script is Copyright (C) 2006-2011 Tenable Network Security, Inc.


Synopsis :

The remote web server suffers from an information disclosure flaw.

Description :

The remote host is running RaidenHTTPD, a web server for Windows.

According to its banner, the version of RaidenHTTPD installed on the
remote Windows host fails to properly validate filename extensions in
URLs. A remote attacker may be able to leverage this issue to
disclose the source of scripts hosted by the affected application
using specially crafted requests with dot, space, and slash
characters.

See also :

http://secunia.com/secunia_research/2006-15/advisory/
http://forum.raidenftpd.com/showflat.php?Cat=&Board=httpd&Number=47234

Solution :

Upgrade to RaidenHTTPD version 1.1.48 or later.

Risk factor :

Medium / CVSS Base Score : 5.0
(CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N)
CVSS Temporal Score : 4.1
(CVSS2#E:F/RL:OF/RC:C)
Public Exploit Available : true

Family: Web Servers

Nessus Plugin ID: 21015 ()

Bugtraq ID: 16934

CVE ID: CVE-2006-0949