It has been reported that TinyHTTPD fails to properly sanitize web requests, allowing for file disclosure or remote command execution. By sending a malicious web request to a vulnerable server, using directory traversal sequences. By exploiting this issue, it is possible for a remote attacker to access sensitive resources located outside of the web root. This vulnerability can also be exploited to execute arbitrary commands in the context of the web server. It should be noted that the web server runs as root by default, due to the need to bind to port 80. It is not known if the server can be configured to drop privileges or may run on an unprivileged port.
It has been reported that TinyHTTPD fails to properly sanitize web requests, allowing for file disclosure or remote command execution. By sending a malicious web request to a vulnerable server, using directory traversal sequences. By exploiting this issue, it is possible for a remote attacker to access sensitive resources located outside of the web root. This vulnerability can also be exploited to execute arbitrary commands in the context of the web server. It should be noted that the web server runs as root by default, due to the need to bind to port 80. It is not known if the server can be configured to drop privileges or may run on an unprivileged port.