TrustPort WebFilter help.php hf Parameter Directory Traversal

high Nessus Plugin ID 69321

Synopsis

The remote web server hosts a PHP script that can be abused to disclose the contents of arbitrary files.

Description

The TrustPort WebFilter administration console install listening on this port fails to sanitize user input to the 'hf' parameter of the 'help.php' script before using it to return the contents of a file.

An unauthenticated, remote attacker can leverage this issue to view arbitrary files on the remote host.

Solution

Upgrade to TrustPort WebFilter 6.0.0.3033 or later.

See Also

https://www.securityfocus.com/archive/1/527826/30/0/threaded

Plugin Details

Severity: High

ID: 69321

File Name: webfilter_hf_dir_traversal.nasl

Version: 1.12

Type: remote

Family: CGI abuses

Published: 8/13/2013

Updated: 1/19/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.4

CVSS v2

Risk Factor: High

Base Score: 7.8

Temporal Score: 6.1

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:N/A:N

CVSS Score Source: CVE-2013-5301

Vulnerability Information

CPE: cpe:/a:trustport:webfilter

Required KB Items: www/PHP

Exploit Ease: No exploit is required

Exploited by Nessus: true

Patch Publication Date: 7/30/2013

Vulnerability Publication Date: 8/7/2013

Reference Information

CVE: CVE-2013-5301

BID: 61662