HTTP File Server (HFS) before 2.2c allows remote attackers to obtain configuration and usage details by using an id element such as <id>%version%</id> in HTTP Basic Authentication instead of a username and password, as demonstrated by placing this id element in the userinfo subcomponent of a URL.
References
Configurations
History
21 Nov 2024, 00:42
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/28631 - Vendor Advisory | |
References | () http://securityreason.com/securityalert/3583 - | |
References | () http://www.rejetto.com/hfs/?f=wn - Exploit | |
References | () http://www.securityfocus.com/archive/1/486872/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/27423 - | |
References | () http://www.syhunt.com/advisories/hfs-1-template.txt - | |
References | () http://www.syhunt.com/advisories/hfshack.txt - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/39871 - |
Information
Published : 2008-01-29 00:00
Updated : 2025-04-09 00:30
NVD link : CVE-2008-0410
Mitre link : CVE-2008-0410
CVE.ORG link : CVE-2008-0410
JSON object : View
Products Affected
hfs
- http_file_server
CWE
CWE-287
Improper Authentication