Vulnerability Assessment & Network Security Forums

If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.

Home >> Browse Vulnerability Assessment Database >> CGI abuses >> NETFile FTP/Web Server Directory Traversal Vulnerabilities

Vulnerability Assessment Details

NETFile FTP/Web Server Directory Traversal Vulnerabilities

Vulnerability Assessment Summary
Checks for directory traversal vulnerabilities in NETFile FTP/Web Server

Detailed Explanation for this Vulnerability Assessment

Summary :

The remote web server is vulnerable to a directory traversal attack.

Description :

The version of NETFile FTP/Web server installed on the remote host is
prone to directory traversal attacks. Specifically, a possible hacker can
create directories outside the server's folder path with a
specially-crafted URL, and he may be able to delete arbitrary files
and directories on the remote host too.

See also :

Solution :

Configure NETFile with tighter file and folder rights for users and
groups. Or upgrade to NETFile FTP/Web Server version 7.5.0 Beta 7 or

Network Security Threat Level:

Low / CVSS Base Score : 1

Networks Security ID: 13388

Vulnerability Assessment Copyright: This script is Copyright (C) 2005-2006 Tenable Network Security

Cables, Connectors


No Discussions have been posted on this vulnerability.