nginx < 0.7.63 / 0.8.x < 0.8.17 Directory Traversal

medium Nessus Plugin ID 107261

Synopsis

The remote web server is affected by a directory traversal vulnerability.

Description

According to the self-reported version in its response header, the version of nginx hosted on the remote web server is less than 0.7.63 or 0.8.x prior to 0.8.17. It is, therefore, affected by a directory traversal vulnerability as noted in the vendor advisory.

Solution

Upgrade to nginx version 0.7.63 / 0.8.17 or later.

See Also

http://nginx.org/en/security_advisories.html

Plugin Details

Severity: Medium

ID: 107261

File Name: nginx_0_7_63.nasl

Version: 1.9

Type: combined

Agent: unix

Family: Web Servers

Published: 3/9/2018

Updated: 4/11/2022

Configuration: Enable thorough checks

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.3

CVSS v2

Risk Factor: Medium

Base Score: 4.9

Temporal Score: 3.8

Vector: CVSS2#AV:N/AC:M/Au:S/C:P/I:P/A:N

CVSS Score Source: CVE-2009-3898

CVSS v3

Risk Factor: Medium

Base Score: 5.4

Temporal Score: 4.9

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:nginx:nginx

Required KB Items: installed_sw/nginx

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 11/24/2009

Vulnerability Publication Date: 11/24/2009

Reference Information

CVE: CVE-2009-3898

CWE: 22