Synopsis
The remote web server is affected by an information disclosure vulnerability.
Description
It is possible to access arbitrary files on the remote web server by appending ~nobody/ in front of their name (as in ~nobody/etc/passwd).
This problem is due to a misconfiguration in the web server that sets 'UserDir' or its equivalent to './'.
Solution
If using Apache, set 'UserDir' to 'public_html/' or something else.
If using lighttpd, upgrade to version 1.4.19 or later.
Otherwise, contact the web server vendor.
Plugin Details
File Name: httpd_nobody.nasl
Supported Sensors: Nessus
Vulnerability Information
Exploited by Nessus: true
Vulnerability Publication Date: 1/1/2000