Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> CGI abuses >> Brio Unix Directory Traversal


Vulnerability Assessment Details

Brio Unix Directory Traversal

Vulnerability Assessment Summary
Brio Unix Directory Traversal

Detailed Explanation for this Vulnerability Assessment

The Brio web application interface has a directory traversal
in the component 'odscgi'. A possible hacker may exploit this flaw to read
arbitrary files on the remote host by submitting a URL like :

http://www.example.com/ods-cgi/odscgi?HTMLFile=../../../../../../etc/passwd

Solution: Check www.brio.com for updated software.
Risk Factor: Medium

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2003 Chris Foster

Cables, Connectors

Lot of 24 Mixed 8GB DDR3 PC3-10600s and PC3-12800s So-DIMM Laptop Memory
$500.0
Lot of 24 Mixed 8GB DDR3 PC3-10600s and PC3-12800s So-DIMM Laptop Memory pictureRAMAXEL 8GB (2x 4GB) DDR3L 1600 MHz Desktop Memory PC3L-12800U DIMM RAM
$24.0
RAMAXEL 8GB (2x 4GB) DDR3L 1600 MHz Desktop Memory PC3L-12800U DIMM RAM pictureCreative Finger 32G USB Flash Drive USB2.0 Pen Drive Mini Flash Memory Stick JL
$10.56
Creative Finger 32G USB Flash Drive USB2.0 Pen Drive Mini Flash Memory Stick JL pictureCreative Finger 32G USB Flash Drive USB2.0 Pen Drive Mini Flash Memory Stick JL
$10.56
Creative Finger 32G USB Flash Drive USB2.0 Pen Drive Mini Flash Memory Stick JL picture


Discussions

No Discussions have been posted on this vulnerability.