Mutiny < 5.0-1.11 Multiple Directory Traversals

High Nessus Plugin ID 66497


The remote host contains a network monitoring application that is affected by multiple directory traversal vulnerabilities.


The remote server hosts a version of Mutiny prior to 5.0-1.11. It is, therefore, reportedly affected by multiple directory traversal vulnerabilities that could allow an authenticated attacker to upload, delete, and move files on the remote system with root privileges. The functions for UPLOAD, DELETE, CUT, and COPY used in the 'Documents' section of the web frontend of Mutiny are affected.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.


Upgrade to version 5.0-1.11 or later.

See Also

Plugin Details

Severity: High

ID: 66497

File Name: mutiny_5_0_1_11.nasl

Version: 1.6

Type: remote

Family: CGI abuses

Published: 2013/05/17

Updated: 2019/11/27

Dependencies: 62717

Risk Information

Risk Factor: High

CVSS Score Source: CVE-2013-0136

CVSS v2.0

Base Score: 8.5

Temporal Score: 7

Vector: CVSS2#AV:N/AC:M/Au:S/C:C/I:C/A:C

Temporal Vector: CVSS2#E:F/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:mutiny:standard

Required KB Items: www/mutiny

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2013/05/15

Vulnerability Publication Date: 2013/05/15

Exploitable With

Metasploit (Mutiny 5 Arbitrary File Upload)

Reference Information

CVE: CVE-2013-0136

BID: 59883

CERT: 701572