GoAhead Embedded Web Server websNormalizeUriPath() Directory Traversal Vulnerability

This script is Copyright (C) 2015 Tenable Network Security, Inc.


Synopsis :

The remote device is affected by a directory traversal vulnerability.

Description :

The remote GoAhead embedded web server is affected by a directory
traversal vulnerability due to a flaw in the websNormalizeUriPath()
function. A remote, unauthenticated attacker can exploit this flaw to
obtain arbitrary files on the affected host.

The flaw that allows the directory traversal may also be used to
perform a heap-based buffer overflow, potentially allowing code
execution or a denial of service condition.

See also :

http://www.nessus.org/u?a935864f
http://seclists.org/oss-sec/2015/q1/1028

Solution :

Contact the vendor of the device running the GoAhead embedded web
server for a fixed version.

Risk factor :

High / CVSS Base Score : 7.5
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVSS Temporal Score : 6.5
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : false

Family: Web Servers

Nessus Plugin ID: 82566 ()

Bugtraq ID: 73404

CVE ID: CVE-2014-9707

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now