Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
146377 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.105858
Categoría:Web application abuses
Título:Multiple Vendors '/servlets/FetchFile' Multiple Vulnerabilities - Active Check
Resumen:Multiple vulnerabilities affecting the remote device have been; found, these vulnerabilities allows uploading of arbitrary files and their execution, arbitrary; file download (with directory traversal), use of a weak algorithm for storing passwords and; session hijacking.
Descripción:Summary:
Multiple vulnerabilities affecting the remote device have been
found, these vulnerabilities allows uploading of arbitrary files and their execution, arbitrary
file download (with directory traversal), use of a weak algorithm for storing passwords and
session hijacking.

Solution:
No known solution was made available for at least one year
since the disclosure of this vulnerability. Likely none will be provided anymore. General
solution options are to upgrade to a newer release, disable respective features, remove the
product or replace the product by another one.

CVSS Score:
5.0

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:N/A:N

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2016-6601
BugTraq ID: 92402
http://www.securityfocus.com/bid/92402
Bugtraq: 20160808 [CVE-2016-6600/1/2/3]: Multiple vulnerabilities (RCE, file download, etc) in WebNMS Framework 5.2 / 5.2 SP1 (Google Search)
http://www.securityfocus.com/archive/1/539159/100/0/threaded
https://www.exploit-db.com/exploits/40229/
http://seclists.org/fulldisclosure/2016/Aug/54
http://packetstormsecurity.com/files/138244/WebNMS-Framework-5.2-SP1-Traversal-Weak-Obfuscation-User-Impersonation.html
http://www.rapid7.com/db/modules/auxiliary/admin/http/webnms_cred_disclosure
http://www.rapid7.com/db/modules/auxiliary/admin/http/webnms_file_download
https://blogs.securiteam.com/index.php/archives/2712
https://github.com/pedrib/PoC/blob/master/advisories/webnms-5.2-sp1-pwn.txt
CopyrightCopyright (C) 2016 Greenbone AG

Esta es sólo una de 146377 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.