CERN httpd Double Slash Protected Webpage Bypass

This script is Copyright (C) 2005-2017 Tenable Network Security, Inc.

Synopsis :

The remote web server is affected by an information disclosure

Description :

The remote web server allows an attacker to access protected web pages
by replacing slashes in the URL with '//' or '/./', which is a known
problem in older versions of CERN web server.

Solution :

Contact the web server vendor for an update or tighten its filtering
rules to reject patterns such as :


Risk factor :

Medium / CVSS Base Score : 5.0

Family: Web Servers

Nessus Plugin ID: 17230 (cern_httpd_access_ctrl.nasl)

Bugtraq ID:


Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now