Executive Summary

Name CVE-2003-0417 First vendor Publication 2003-06-30
Vendor Cve Last vendor Modification 2016-10-18

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:P/I:N/A:N)
Cvss Base Score 5 Attack Range Network
Cvss Impact Score 2.9 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores


Directory traversal vulnerability in Son hServer 0.2 allows remote attackers to read arbitrary files via ".|." (modified dot-dot) sequences.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0417

CAPEC : Common Attack Pattern Enumeration & Classification

Id Name
CAPEC-3 Using Leading 'Ghost' Character Sequences to Bypass Input Filters
CAPEC-43 Exploiting Multiple Input Interpretation Layers
CAPEC-78 Using Escaped Slashes in Alternate Encoding
CAPEC-79 Using Slashes in Alternate Encoding
CAPEC-80 Using UTF-8 Encoding to Bypass Validation Logic

CWE : Common Weakness Enumeration

% Id Name

CPE : Common Platform Enumeration

Application 1

Open Source Vulnerability Database (OSVDB)

Id Description
4662 Son hServer URI Traversal Arbitrary File/Directory Access

Son hServer contains a flaw that allows a remote attacker to access arbitrary files and directories outside of the web path. The issue is due to the server not properly sanitizing user input, specifically traversal style attacks (../../) supplied via URI.

Nessus® Vulnerability Scanner

Date Description
2003-06-02 Name : Super-M Son hServer is vulnerable to information disclosure.
File : superm_son_hserver_traversal.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

Source Url
BID http://www.securityfocus.com/bid/7717
BUGTRAQ http://marc.info/?l=bugtraq&m=105417983711685&w=2
XF http://www.iss.net/security_center/static/12103.php

Alert History

If you want to see full details history, please login or register.
Date Informations
2020-05-23 00:15:25
  • Multiple Updates
2016-10-18 12:01:11
  • Multiple Updates
2014-02-17 10:26:13
  • Multiple Updates
2013-05-11 11:51:20
  • Multiple Updates