{"vuid":"VU#167464","idnumber":"167464","name":"Robtex Viking Web Server permits traversal out of HTTP docs root directory","keywords":["Robtex","Viking","directory traversal","../","relative path","dot-dot"],"overview":"Viking v1.07 is a 'multi-protocol-internet-server' available from http://www.robtex.com. A vulnerability exists with this web server which allows a remote user to see any file on the server with read permissions enabled.","clean_desc":"Viking v1.07 does not stop requests which traverse the parent directory link out of the web root directory. As a result, a remote user can traverse the entire file system on the server host and request any file. If the web server process has read permissions to access that file, it will return its contents to the remote user.","impact":"Remote users can see any file on the server which is readable by the web server process, regardless of the file's location.","resolution":"Download and install the latest beta version available at http://www.robtex.com/viking/dl.htm","workarounds":"None.","sysaffected":"","thanks":"Thanks to Joe Testa for finding and reporting this vulnerability.","author":"This document was written by Shawn Van Ittersum.","public":["http://www.securityfocus.com/bid/2643","http://www.robtex.com/viking/bugs.htm"],"cveids":["CVE-2001-0467"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2001-04-27T17:32:05Z","publicdate":"2001-04-23T20:59:22Z","datefirstpublished":"2001-06-13T20:21:47Z","dateupdated":"2001-06-13T20:21:49Z","revision":11,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"20","cam_exploitation":"0","cam_internetinfrastructure":"10","cam_population":"2","cam_impact":"4","cam_easeofexploitation":"20","cam_attackeraccessrequired":"20","cam_scorecurrent":"1.8","cam_scorecurrentwidelyknown":"1.8","cam_scorecurrentwidelyknownexploited":"3","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":1.8,"vulnote":null}