Symantec Backup Exec System Recovery Manager Traversal Arbitrary File Access

medium Nessus Plugin ID 32475

Synopsis

The remote web server contains a Tomcat servlet that is prone to a directory traversal attack.

Description

The remote host appears to be running Symantec Backup Exec System Recovery Manager, a backup manager solution.

The Tomcat servlet 'reportsfile' included in the version of Backup Exec System Recovery Manager installed on the remote host fails to properly sanitize user input to the 'filename' parameter of directory traversal sequences. An unauthenticated, remote attacker can leverage this issue to view arbitrary files on the remote host.

Solution

Upgrade to Symantec Backup Exec System Recovery Manager version 8.0.2 / 7.0.4 or later.

See Also

http://www.nessus.org/u?6f519315

Plugin Details

Severity: Medium

ID: 32475

File Name: besr_filename_dir_traversal.nasl

Version: 1.15

Type: remote

Family: CGI abuses

Published: 5/29/2008

Updated: 1/19/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.4

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Information

Exploit Ease: No known exploits are available

Exploited by Nessus: true

Reference Information

CVE: CVE-2008-2512

BID: 29350

CWE: 22

Secunia: 30432