Synopsis
This Tenable product detected files or paths on the scanned Windows system which contain characters with command injection or privilege escalation potential.
Description
This Tenable product detected files or paths on the scanned Windows system which contain characters with command injection or privilege escalation potential. Although characters such as singlequote, ampersand, and semicolon are perfectly valid Windows filepath characters, use of them may lead to problems or security compromise when used in further commands.
This product has chosen in certain plugins to avoid digging within those files and directories for security reasons.
These should be renamed to avoid security compromise.
Solution
Rename these files or folders to not include dangerous characters.
Plugin Details
File Name: dangerous_filepaths_win.nasl
Agent: windows
Supported Sensors: Nessus
Vulnerability Information
Required KB Items: Host/Windows/dangerous_filepaths_found