IPCheck Server Monitor < 5.3.3.639 Traversal Arbitrary File Access

Low Nessus Network Monitor Plugin ID 3723

Synopsis

The remote web server is prone to a directory traversal attack.

Description

The remote host is running IPCheck Server Monitor, a network resource monitoring tool for Windows. The installed version of IPCheck Server Monitor fails to filter directory traversal sequences from requests that pass through the web server interface. An attacker can exploit this issue to read arbitrary files on the remote host subject to the privileges under which the affected application runs.

Solution

Upgrade to version 5.3.3.639 or higher.

See Also

http://www.paessler.com/ipcheck/history

http://www.securityfocus.com/archive/1/444227/30/0/threaded

http://www.securityfocus.com/archive/1/442822/30/0/threaded

Plugin Details

Severity: Low

ID: 3723

Family: Web Servers

Published: 2006/08/14

Modified: 2018/07/11

Dependencies: 1442

Nessus ID: 22205

Risk Information

Risk Factor: Low

CVSSv2

Base Score: 3.3

Temporal Score: 2.7

Vector: CVSS2#AV:A/AC:L/Au:N/C:P/I:N/A:N

Temporal Vector: CVSS2#E:F/RL:OF/RC:C

CVSSv3

Base Score: 4.2

Temporal Score: 3.9

Vector: CVSS3#AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Temporal Vector: CVSS3#E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:ipcheck:server_monitor

Reference Information

CVE: CVE-2006-4140

BID: 19473