Vulnerability Center: 2163 - Directory Traversal in SolarWinds TFTP Server 5.0.Deliver unified and comprehensive visibility for cloud-native, custom web applications to help ensure optimal service levels and user satisfaction with key business services Snort Message: PROTOCOL-TFTP parent directory Product infoĪctive APT Groups: □ Countermeasures info Recommended: no mitigation known The vulnerability is also documented in the databases at X-Force ( 10469), Vulnerability Center ( SBV-2163) and Tenable ( 10333). Attack attempts may be identified with Snort ID 519. It may be suggested to replace the affected object with an alternative product. There is no information about possible countermeasures known. The vulnerability scanner Nessus provides a plugin with the ID 10333, which helps to determine the existence of the flaw in a target environment. The MITRE ATT&CK project declares the attack technique as T1006. There are neither technical details nor an exploit publicly available. No form of authentication is required for exploitation. This vulnerability is handled as CVE-2002-1209. The weakness was shared by Matthew Murphy (mattmurphy) (Website). CVE summarizes:ĭirectory traversal vulnerability in SolarWinds TFTP Server 5.0.55, and possibly earlier, allows remote attackers to read arbitrary files via ".\" (dot-dot backslash) sequences in a GET request. The software uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the software does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory. Using CWE to declare the problem leads to CWE-22. The manipulation with an unknown input leads to a path traversal vulnerability. Affected by this issue is an unknown function of the component GET Request Handler. A high score indicates an elevated risk to be targeted for this vulnerability.Ī vulnerability was found in SolarWinds TFTP Server 5.0.55 ( File Transfer Software). The CTI Interest Score identifies the interest of attackers and the security community for this specific vulnerability in real-time. Our Cyber Threat Intelligence team is monitoring different web sites, mailing lists, exploit markets and social media networks.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |