RabidHamster R4 left_console.html cmd Parameter loadfile() Function Traversal Arbitrary File Access

medium Nessus Plugin ID 61461

Synopsis

The remote web server is affected by a directory traversal vulnerability.

Description

The R4 embedded web server listening on the remote host is affected by a directory traversal vulnerability that can allow for a remote attacker to view the contents of files located outside of the server's root directory by sending a URI that contains directory traversal characters. The issue is exploitable when the network settings are enabled in the 'Settings' menu.

Solution

Unknown at this time.

See Also

http://aluigi.altervista.org/adv/r4_1-adv.txt

Plugin Details

Severity: Medium

ID: 61461

File Name: rabidhamster_r4_dir_traversal.nasl

Version: 1.6

Type: remote

Family: CGI abuses

Published: 8/9/2012

Updated: 1/19/2021

Supported Sensors: Nessus

Risk Information

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 4.1

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N

Vulnerability Information

CPE: x-cpe:/a:rabidhamster:r4

Required KB Items: www/rabidhamster_r4

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Available: true

Exploit Ease: Exploits are available

Exploited by Nessus: true

Vulnerability Publication Date: 2/9/2012

Reference Information

BID: 51967