Resin Traversal Arbitrary File Access

medium Nessus Plugin ID 10656

Synopsis

The remote web server is vulnerable to a directory traversal attack.

Description

It is possible to read arbitrary files on the remote server by prepending /\../\../ to the file name.

Solution

Upgrade to Resin version 1.2.3.

Plugin Details

Severity: Medium

ID: 10656

File Name: resin_traversal.nasl

Version: 1.26

Type: remote

Family: Web Servers

Published: 4/17/2001

Updated: 7/27/2018

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.2

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 3.9

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Information

CPE: cpe:/a:caucho:resin

Required KB Items: www/resin

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 2/15/2001

Reference Information

CVE: CVE-2001-0304

BID: 2384