Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> CGI abuses >> WebAPP File Disclosure Vulnerability


Vulnerability Assessment Details

WebAPP File Disclosure Vulnerability

Vulnerability Assessment Summary
Checks for file disclosure vulnerability in WebAPP

Detailed Explanation for this Vulnerability Assessment

Summary :

The remote web server contains a CGI script that is affected by an
information disclosure vulnerability.

Description :

According to its banner, the remote host is running a version of
WebAPP that suffers from an unspecified file disclosure vulnerability.
A possible hacker may be able to use this flaw to disclose the contents of
'dat' files.

See also :

http://www.web-app.org/cgi-bin/index.cgi?action=viewnews&id=195

Solution :

Apply the March 2005 Security Update.

Network Security Threat Level:

Low / CVSS Base Score : 2
(AV:R/AC:L/Au:NR/C:P/A:N/I:N/B:N)

Networks Security ID: 12938

Vulnerability Assessment Copyright: This script is Copyright (C) 2005 Tenable Network Security

Cables, Connectors

IBM 00Y8457 System Board X 3650 M4- V1 Processor Board 00Y8457 7915-AC1
$224.99
IBM 00Y8457 System Board X 3650 M4- V1 Processor Board 00Y8457 7915-AC1 pictureLot of 2.9 lbs (32) processors, slot type , for scrap gold recovery
$45.0
Lot of 2.9 lbs (32) processors, slot type , for scrap gold recovery pictureMatched Pair of SR1AZ Intel E5-2630LV2 2.40 GHz LGA2011 Processors
$58.98
Matched Pair of SR1AZ Intel E5-2630LV2 2.40 GHz LGA2011 Processors pictureMount-It MI-7150 CPU Under Desk Mount Tower Holder
$15.0
Mount-It MI-7150 CPU Under Desk Mount Tower Holder picture


Discussions

No Discussions have been posted on this vulnerability.