VMware Host Agent Directory Traversal (VMSA-2009-0015)

medium Nessus Plugin ID 44646
New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.


A web application on the remote host has a directory traversal vulnerability.


The version of VMware Host Agent (hostd) running on the remote host has a directory traversal vulnerability. The affected service runs as root. VMware ESX, VMware ESXi, and VMware Server on Linux are affected.

A remote attacker could exploit this to read arbitrary files, including guest VMs, from the system.


Apply the relevant upgrade referenced in the VMware advisory.

See Also





Plugin Details

Severity: Medium

ID: 44646

File Name: vmware_dir_traversal_vmsa_2009_0015.nasl

Version: 1.20

Type: remote

Family: CGI abuses

Published: 2/17/2010

Updated: 1/19/2021

Dependencies: vmware_hostd_detect.nasl, os_fingerprint.nasl

Risk Information


Risk Factor: Medium

Score: 4.2


Risk Factor: Medium

Base Score: 5

Temporal Score: 4.1

Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Temporal Vector: E:F/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:a:vmware:esx, cpe:/a:a:vmware:esxi, cpe:/a:a:vmware:server

Required KB Items: www/vmware_hostd

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Ease: No exploit is required

Exploited by Nessus: true

Patch Publication Date: 10/27/2009

Vulnerability Publication Date: 10/27/2009

Exploitable With

CANVAS (D2ExploitPack)

Elliot (Vmware Server File Disclosure)

Reference Information

CVE: CVE-2009-3733

BID: 36842

VMSA: 2009-0015

Secunia: 37186

CWE: 22