Easy File Sharing Web Server Format String

medium Nessus Network Monitor Plugin ID 3470

Synopsis

The remote web server suffers from a format string vulnerability.

Description

The remote host is running Easy File Sharing Web Server, a file sharing application / web server for Windows. The version of Easy File Sharing Web Server installed on the remote host may crash if it receives requests with an option parameter consisting of a format string. It is unknown whether this issue can be exploited to execute arbitrary code on the remote host, although it is likely the case. In addition, the application reportedly allows remote users to upload arbitrary files to arbitrary locations on the affected host. An attacker may be able to leverage this issue to completely compromise the host by placing them in the startup folder and waiting for a reboot. Additionally, it fails to sanitize input to the 'Description' field when creating a folder or uploading a file, which could lead to cross-site scripting attacks. Note that by default the application runs with the privileges of the user who started it, although it can be configured to run as a service.

Solution

Upgrade or patch according to vendor recommendations.

See Also

http://www.securityfocus.com/archive/1/427158/30/0/threaded

Plugin Details

Severity: Medium

ID: 3470

Family: Web Servers

Published: 3/9/2006

Updated: 3/6/2019

Nessus ID: 21039

Risk Information

VPR

Risk Factor: Medium

Score: 6.6

CVSS v2

Risk Factor: High

Base Score: 7.8

Temporal Score: 7.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C

CVSS v3

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 4.2

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L

Temporal Vector: CVSS:3.0/E:F/RL:U/RC:X

Vulnerability Information

CPE: cpe:/a:efs_software:efs_web_server

Reference Information

CVE: CVE-2006-1159, CVE-2006-1160, CVE-2006-1161

BID: 17046