Xerver HTTP Server 4.32 allows remote attackers to obtain the source code for a web page via an HTTP request with the addition of ::$DATA after the HTML file name.
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
http://secunia.com/advisories/36681 | third party advisory vendor advisory |
http://osvdb.org/58104 | vdb entry |
http://www.exploit-db.com/exploits/9649 | exploit |