Resin < 3.1.1 Directory Traversal Vulnerability (2)

medium Nessus Network Monitor Plugin ID 3992

Synopsis

The remote web server is prone to a directory traversal attack.

Description

The remote host is running Resin, an application server. The installation of Resin on the remote host allows an unauthenticated remote attacker to gain access to the web-inf directories, or any known subdirectories, on the affected Windows host, which may lead to a loss of confidentiality.

Solution

Upgrade to version 3.1.1 or higher.

See Also

http://www.caucho.com/resin-3.1/changes/changes.xtp

http://www.rapid7.com/advisories/R7-0029.jsp

Plugin Details

Severity: Medium

ID: 3992

Family: Web Servers

Published: 5/16/2007

Updated: 3/6/2019

Nessus ID: 25241

Risk Information

VPR

Risk Factor: Low

Score: 3.5

CVSS v2

Risk Factor: Low

Base Score: 3.3

Temporal Score: 2.7

Vector: CVSS2#AV:A/AC:L/Au:N/C:P/I:N/A:N

CVSS v3

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 4

Vector: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:caucho_technology:resin

Reference Information

CVE: CVE-2007-2440, CVE-2007-2441

BID: 23985