Vulnerability Assessment & Network Security Forums
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.
Vulnerability Assessment Details
Checks version of Dwarf HTTP Server
Detailed Explanation for this Vulnerability Assessment
The remote web server suffers from multiple flaws.
The remote host is running Dwarf HTTP Server, a full-featured,
Java-based web server.
According to its banner, the version of Dwarf HTTP Server on the
remote host reportedly fails to properly validate filename extensions
in URLs. A remote attacker may be able to leverage this issue to
disclose the source of scripts hosted by the affected application
using specially-crafted requests with dot, space, slash, and NULL
In addition, the web server also reportedly fails to sanitize requests
before returning error pages, which can be exploited to conduct
cross-site scripting attacks.
See also :
Upgrade to Dwarf HTTP Server version 1.3.3 or later.
Network Security Threat Level:
Low / CVSS Base Score : 3.3
Networks Security ID: 17123
Vulnerability Assessment Copyright: This script is Copyright (C) 2006 Tenable Network Security
|DELL POWEREDGE R730XD SERVER 12 BAY TWO E5-2630V4 2.2GHz 64GB 12 X 10TB 1.2TB 10
No Discussions have been posted on this vulnerability.