CodeMeter Virtual Directory Traversal Arbitrary File Access (remote check)

medium Nessus Plugin ID 57801

Synopsis

A web application running on the remote host is affected by a directory traversal vulnerability.

Description

The CodeMeter WebAdmin server running on the remote host is affected by a directory traversal vulnerability due to a failure to properly sanitize HTTP requests for files in virtual directories. An unauthenticated, remote attacker can exploit this issue to retrieve the contents of arbitrary files on the remote host, provided the target file is among a list of allowed extensions (for example, 'txt', 'htm', 'html', 'images', etc.).

Solution

Upgrade to CodeMeter 4.30d (4.30.498.504) or later.

See Also

http://aluigi.altervista.org/adv/codemeter_1-adv.txt

Plugin Details

Severity: Medium

ID: 57801

File Name: codemeter_webadmin_virtual_help_dir_traversal.nasl

Version: 1.8

Type: remote

Family: CGI abuses

Published: 2/2/2012

Updated: 1/19/2021

Supported Sensors: Nessus

Risk Information

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.6

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N

CVSS v3

Risk Factor: Medium

Base Score: 5.3

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Vulnerability Information

CPE: cpe:/a:wibu:codemeter_runtime

Required KB Items: installed_sw/CodeMeter

Exploit Available: true

Exploit Ease: Exploits are available

Exploited by Nessus: true

Patch Publication Date: 8/24/2011

Vulnerability Publication Date: 9/2/2011

Reference Information

BID: 49437