Directory Traversal

critical Nessus Plugin ID 121037

Synopsis

Arbitrary files may be accessed or executed on the remote host.

Description

The remote web application fails to adequately sanitize request strings and are affected by directory traversal or local files inclusion vulnerabilities.

By leveraging this issue, an attacker may be able to read arbitrary files on the web server or execute commands.

Solution

User controlled input should not be directly used to construct a file path. If this functionality is required, proper sanitization must be used to ensure all special characters have been removed.

Plugin Details

Severity: Critical

ID: 121037

File Name: directory_traversal.nbin

Version: 1.56

Type: remote

Family: CGI abuses

Published: 1/9/2019

Updated: 7/17/2024

Supported Sensors: Nessus

Risk Information

CVSS Score Rationale: Remote code execution score

CVSS v2

Risk Factor: High

Base Score: 9.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:N

CVSS Score Source: manual

CVSS v3

Risk Factor: Critical

Base Score: 9.1

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

Vulnerability Information

Required KB Items: Settings/enable_web_app_tests