The host is running Sockso and is prone to directory traversal vulnerability.
Successful exploitation will allow attacker to obtain sensitive information that could aid in further attacks. Impact Level: Application
Upgrade to Sockso version 1.5.1 or later. For updates refer to http://sockso.pu-gh.com/
The flaw is due to improper validation of URI containing '../' or '..\' sequences, which allows attackers to read arbitrary files via directory traversal attacks.
Sockso version 1.5 and prior
- IBM WebSphere Application Server (WAS) Security Bypass Vulnerability - March 2011
- Apache Tomcat 'sort' and 'orderBy' Parameters Cross Site Scripting Vulnerabilities
- LiteSpeed Web Server Source Code Information Disclosure Vulnerability
- IBM WebSphere Application Server (WAS) Multiple Vulnerabilities 02 - March 2011
- Check for bdir.htr files