Description
EasyPHP Webserver 14.1 contains a path traversal vulnerability that allows remote users with low privileges to access files outside the document root by bypassing SecurityManager restrictions. Attackers can send GET requests with encoded directory traversal sequences like /..%5c..%5c to read system files such as /windows/win.ini.
Problem types
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Product status
Credits
Rafael Pedrero
References
www.exploit-db.com/exploits/51430
www.exploit-db.com/exploits/51430 (ExploitDB-51430)
www.easyphp.org/ (Official Product Homepage)
www.vulncheck.com/...ersal-via-directory-traversal-sequences (VulnCheck Advisory: EasyPHP Webserver 14.1 Path Traversal via Directory Traversal Sequences)
Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.