IPCheck Server Monitor < 5.3.3.639 Traversal Arbitrary File Access

medium Nessus Network Monitor Plugin ID 3723

Synopsis

The remote web server is prone to a directory traversal attack.

Description

The remote host is running IPCheck Server Monitor, a network resource monitoring tool for Windows. The installed version of IPCheck Server Monitor fails to filter directory traversal sequences from requests that pass through the web server interface. An attacker can exploit this issue to read arbitrary files on the remote host subject to the privileges under which the affected application runs.

Solution

Upgrade to version 5.3.3.639 or higher.

See Also

http://www.paessler.com/ipcheck/history

http://www.securityfocus.com/archive/1/444227/30/0/threaded

http://www.securityfocus.com/archive/1/442822/30/0/threaded

Plugin Details

Severity: Medium

ID: 3723

Family: Web Servers

Published: 8/14/2006

Updated: 3/6/2019

Nessus ID: 22205

Risk Information

VPR

Risk Factor: Medium

Score: 4.4

CVSS v2

Risk Factor: Low

Base Score: 3.3

Temporal Score: 2.7

Vector: CVSS2#AV:A/AC:L/Au:N/C:P/I:N/A:N

CVSS v3

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 4

Vector: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:ipcheck:server_monitor

Reference Information

CVE: CVE-2006-4140

BID: 19473