Xaraya Directory Traversal Arbitrary File/Directory Manipulation

medium Nessus Network Monitor Plugin ID 3305

Synopsis

The remote host is vulnerable to a directory traversal flaw.

Description

The remote host is running Xaraya, a PHP Web application framework. This version of Xaraya is vulnerable to a directory traversal flaw. An attacker can request and receive a file that is outside of the web directories. Successful exploitation would give the attacker confidential data (such as the user password file or critical configuration files) that would be useful in other types of attacks.

Solution

Upgrade or patch according to vendor recommendations.

See Also

http://www.xaraya.com

Plugin Details

Severity: Medium

ID: 3305

Family: CGI

Published: 11/29/2005

Updated: 3/6/2019

Risk Information

VPR

Risk Factor: Medium

Score: 4.2

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 4.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N

CVSS v3

Risk Factor: Medium

Base Score: 5.3

Temporal Score: 5.1

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

Temporal Vector: CVSS:3.0/E:H/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:xaraya:xaraya

Reference Information

CVE: CVE-2005-3929

BID: 15623