HTTP: WASD http Server Configuation Access

This signature detects attempts to exploit a known vulnerability in the WASD HTTP Server for OpenVMS. Default installations of 1.0 and earlier are vulnerable. Attackers can download the configuration file for the server and obtain information on the ACL and internal directory structure.

Extended Description

Confidential information could be disclosed that may assist an attacker to execute further attacks.

Short Name
HTTP:WASD:CONF-ACCESS
Severity
Minor
Recommended
False
Recommended Action
None
Category
HTTP
Keywords
Access Configuation Server WASD http
Release Date
04/22/2003
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3375
False Positive
Unknown

Found a potential security threat?