Gnapster Absolute Path Name Request Arbitrary File Access

high Nessus Plugin ID 10408

Synopsis

The remote host has a P2P file sharing application installed.

Description

An insecure Napster clone (e.g. Gnapster or Knapster) is running on the remote computer, which allows an intruder to read arbitrary files on this system, regardless of the shared status of the files.

Solution

If this is Gnapster, upgrade to version 1.3.9 or later, as this reportedly fixes the issue.

See Also

https://seclists.org/bugtraq/2000/May/132

Plugin Details

Severity: High

ID: 10408

File Name: gnapster_get_file.nasl

Version: 1.26

Type: remote

Published: 5/12/2000

Updated: 11/15/2018

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.0

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.9

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

Required KB Items: Services/napster

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 5/10/2000

Reference Information

CVE: CVE-2000-0412

BID: 1186