A path traversal vulnerability exists in httpdasm version...
High severity
Unreviewed
Published
Jul 23, 2025
to the GitHub Advisory Database
•
Updated Jul 23, 2025
Description
Published by the National Vulnerability Database
Jul 23, 2025
Published to the GitHub Advisory Database
Jul 23, 2025
Last updated
Jul 23, 2025
A path traversal vulnerability exists in httpdasm version 0.92, a lightweight Windows HTTP server, that allows unauthenticated attackers to read arbitrary files on the host system. By sending a specially crafted GET request containing a sequence of URL-encoded backslashes and directory traversal patterns, an attacker can escape the web root and access sensitive files outside of the intended directory.
References