Novell NetBasic Scripting Server Encoded Traversal Arbitrary File Access

This script is Copyright (C) 2004-2013 David Kyger


Synopsis :

The remote host is vulnerable to information disclosure.

Description :

Novell Netbasic Scripting Server Directory Traversal

It is possible to escape out of the root directory of the scripting server by
substituting a forward or backward slash for %5C. As a result, system
information, such as environment and user information, could be obtained from
the NetWare server.

Example: http://server/nsn/..%5Cutil/userlist.bas

Solution :

Apply the relevant patch and remove all default files from their
respective directories.

Risk factor :

Medium / CVSS Base Score : 5.0
(CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N)
CVSS Temporal Score : 4.3
(CVSS2#E:H/RL:OF/RC:C)
Public Exploit Available : true

Family: Netware

Nessus Plugin ID: 12050 ()

Bugtraq ID: 5523

CVE ID: CVE-2002-1417

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now