Extent RBS Web Server Image Parameter Traversal Arbitrary File Access

medium Nessus Plugin ID 10521

Synopsis

The remote web server contains a CGI application that is prone to a directory traversal attack.

Description

The version of Extent RBS ISP installed on the remote host fails to sanitize input to the 'Image' parameter of the 'Newuser' script. An unauthenticated, remote attacker can leverage this to read arbitrary files on the affected host with the privileges of the web server.

Solution

Unknown at this time.

See Also

https://seclists.org/bugtraq/2000/Sep/387

Plugin Details

Severity: Medium

ID: 10521

File Name: rbs.nasl

Version: 1.30

Type: remote

Family: CGI abuses

Published: 9/26/2000

Updated: 1/19/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.5

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 3.9

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Information

Exploit Ease: No exploit is required

Vulnerability Publication Date: 9/20/2000

Reference Information

CVE: CVE-2000-1036

BID: 1704