WsMp3 Daemon (WsMp3d) HTTP Traversal Arbitrary File Execution/Access

high Nessus Plugin ID 11645

Language:

Synopsis

The remote host is running a MP3 streaming web server with a directory traversal vulnerability.

Description

The remote host is using wsmp3d, an MP3 streaming web server.

There is a flaw in this server that allows anyone to execute arbitrary commands and read arbitrary files with the privileges this server is running with.

Solution

There is no known solution at this time.

See Also

https://seclists.org/vulnwatch/2003/q2/79

Plugin Details

Severity: High

ID: 11645

File Name: wsmp3d_cmd_exec.nasl

Version: 1.17

Type: remote

Family: Web Servers

Published: 5/21/2003

Updated: 11/15/2018

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.4

CVSS v2

Risk Factor: High

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: cpe:/a:wsmp3:wsmp3_daemon

Excluded KB Items: Settings/disable_cgi_scanning

Vulnerability Publication Date: 5/21/2003

Reference Information

CVE: CVE-2003-0338