Easy File Sharing Web Server Format String

High Nessus Network Monitor Plugin ID 3470

Synopsis

The remote web server suffers from a format string vulnerability.

Description

The remote host is running Easy File Sharing Web Server, a file sharing application / web server for Windows. The version of Easy File Sharing Web Server installed on the remote host may crash if it receives requests with an option parameter consisting of a format string. It is unknown whether this issue can be exploited to execute arbitrary code on the remote host, although it is likely the case. In addition, the application reportedly allows remote users to upload arbitrary files to arbitrary locations on the affected host. An attacker may be able to leverage this issue to completely compromise the host by placing them in the startup folder and waiting for a reboot. Additionally, it fails to sanitize input to the 'Description' field when creating a folder or uploading a file, which could lead to cross-site scripting attacks. Note that by default the application runs with the privileges of the user who started it, although it can be configured to run as a service.

Solution

Upgrade or patch according to vendor recommendations.

See Also

http://www.securityfocus.com/archive/1/427158/30/0/threaded

Plugin Details

Severity: High

ID: 3470

File Name: 3470.prm

Family: Web Servers

Published: 2006/03/09

Modified: 2016/01/30

Dependencies: 1442

Nessus ID: 21039

Risk Information

Risk Factor: High

CVSSv2

Base Score: 7.8

Temporal Score: 7.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C

Temporal Vector: CVSS2#E:F/RL:U/RC:ND

CVSSv3

Base Score: 7.5

Temporal Score: 7.3

Vector: CVSS3#AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L

Temporal Vector: CVSS3#E:F/RL:U/RC:X

Reference Information

CVE: CVE-2006-1161, CVE-2006-1159, CVE-2006-1160

BID: 17046

OSVDB: 23791, 23792, 23793