Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> CGI abuses >> NETFile FTP/Web Server Directory Traversal Vulnerabilities


Vulnerability Assessment Details

NETFile FTP/Web Server Directory Traversal Vulnerabilities

Vulnerability Assessment Summary
Checks for directory traversal vulnerabilities in NETFile FTP/Web Server

Detailed Explanation for this Vulnerability Assessment

Summary :

The remote web server is vulnerable to a directory traversal attack.

Description :

The version of NETFile FTP/Web server installed on the remote host is
prone to directory traversal attacks. Specifically, a possible hacker can
create directories outside the server's folder path with a
specially-crafted URL, and he may be able to delete arbitrary files
and directories on the remote host too.

See also :

http://www.security.org.sg/vuln/netfileftp746.html

Solution :

Configure NETFile with tighter file and folder rights for users and
groups. Or upgrade to NETFile FTP/Web Server version 7.5.0 Beta 7 or
later.

Network Security Threat Level:

Low / CVSS Base Score : 1
(AV:R/AC:H/Au:R/C:N/A:N/I:P/B:N)

Networks Security ID: 13388

Vulnerability Assessment Copyright: This script is Copyright (C) 2005-2006 Tenable Network Security

Cables, Connectors

Ram lot 20 - 4gb ddr3 mix speed all tested
$200.0
Ram lot 20 - 4gb ddr3 mix speed all tested pictureHP Pavilion dv5 AMD Turion II P540 Dual Core 2.40GHz 4GB RAM 500GB Windows 10
$105.0
HP Pavilion dv5 AMD Turion II P540 Dual Core 2.40GHz 4GB RAM 500GB Windows 10 picture


Discussions

No Discussions have been posted on this vulnerability.