PHP Rocket for FrontPage phprocketaddin page Parameter Traversal Arbitrary File Access

medium Nessus Plugin ID 10831

Synopsis

Arbitrary files may be read on the remote server.

Description

There is a vulnerability in the PHP Rocket Add-in for FrontPage that allows a remote attacker to view the contents of any arbitrary file to which the web user has access. This vulnerability exists because the PHP Rocket Add-in does not filter out ../ and is, therefore, susceptible to this directory traversal attack.

Solution

None

Plugin Details

Severity: Medium

ID: 10831

File Name: phprocketaddin_traversal.nasl

Version: 1.31

Type: remote

Family: CGI abuses

Published: 1/17/2002

Updated: 4/11/2022

Configuration: Enable thorough checks

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.4

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Information

CPE: cpe:/a:total_pc_solutions:php_rocket_add-in

Required KB Items: www/PHP

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Ease: No exploit is required

Exploited by Nessus: true

Vulnerability Publication Date: 12/28/2001

Reference Information

CVE: CVE-2001-1204

BID: 3751