Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> CGI abuses >> Easy File Sharing Web Server Information Disclosure


Vulnerability Assessment Details

Easy File Sharing Web Server Information Disclosure

Vulnerability Assessment Summary
Tries to read a local file via EFS

Detailed Explanation for this Vulnerability Assessment


Summary :

The remote web server is affected by an information disclosure
vulnerability.

Description :

The version of Easy File Sharing Web Server that is installed on the
remote host fails to restrict access to files via alternative data
streams. By passing a specially-crafted request to the web server, an
attacker may be able to access privileged information.

See Also :

http://www.milw0rm.com/exploits/2690

Solution :

Unknown at this time.

Network Security Threat Level:

Low / CVSS Base Score : 2.3
(AV:R/AC:L/Au:NR/C:P/I:N/A:N/B:N)

Networks Security ID: 20823

Vulnerability Assessment Copyright: This script is Copyright (C) 2006 Justin Seitz

Cables, Connectors

Intel S1200V3RPL Micro-ATX Server M/B LGA1150
$320.63
Intel S1200V3RPL Micro-ATX Server M/B LGA1150 pictureHP AB315-60301 AB315-3801C AB315A CORE I/O BOARD for RX7640 SERVER
$558.41
HP AB315-60301 AB315-3801C AB315A CORE I/O BOARD for RX7640 SERVER pictureIBM HS22V BladeServer 2 x Xeon X5670 2.93GHz 128GB RAM QLogic 8GBFC 500GB SSD
$1183.83
IBM HS22V BladeServer 2 x Xeon X5670 2.93GHz 128GB RAM  QLogic 8GBFC 500GB SSD pictureHP AP880A D2200sb Storage Array Blade Server c7000
$1057.26
HP AP880A D2200sb Storage Array Blade Server c7000  picture


Discussions

No Discussions have been posted on this vulnerability.