RaidenHTTPD Crafted Request Arbitrary File Access

High Nessus Plugin ID 16313


The remote web server is prone to a directory traversal attack.


The remote host is running a version of RaidenHTTPD which is vulnerable to a remote directory traversal bug. An attacker exploiting this bug would be able to gain access to potentially confidential material outside of the web root.


Upgrade to RaidenHTTPD version 1.1.31 or later.

See Also

Plugin Details

Severity: High

ID: 16313

File Name: raidenHTTPD_dir_traversal.nasl

Version: $Revision: 1.13 $

Type: remote

Family: Web Servers

Published: 2005/02/07

Modified: 2016/11/02

Dependencies: 10107

Risk Information

Risk Factor: High


Base Score: 7.8

Temporal Score: 6.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:N/A:N

Temporal Vector: CVSS2#E:H/RL:OF/RC:C

Vulnerability Information

Exploit Available: true

Exploit Ease: No exploit is required

Vulnerability Publication Date: 2005/02/05

Reference Information

BID: 12451

OSVDB: 13575