A logwatch report outputted the following message.
A total of 1 possible successful probes were detected (the following URLs
contain strings that match one or more of a listing of strings that
indicate a possible exploit):
/?_SERVER[DOCUMENT_ROOT]=../../../../../../../../../../../etc/passwd%00 HTTP Response 200
I am aware that this match is based on a predefined list of strings from Logwatch and that it is a possible exploit but I am unsure how to investigate further to be certain it is not one.
Is it enough to just visit this url in the browser and check if there is no private information being outputted or are there other methods/places I need to check?
Does the HTTP response 200 means it reached the /etc/passwd directory?