|Category:||Remote file access|
|Title:||FSP Suite Directory Traversal Vulnerability|
|Summary:||The FSP Suite (daemon) has been found to improperly filter out; paths with trailing / or starting with /. This would allow an attacker; access to files that reside outside the bounding FSP root directory.|
The FSP Suite (daemon) has been found to improperly filter out
paths with trailing / or starting with /. This would allow an attacker
access to files that reside outside the bounding FSP root directory.
No known solution was made available for at least one year
since the disclosure of this vulnerability. Likely none will be provided anymore.
General solution options are to upgrade to a newer release, disable respective features,
remove the product or replace the product by another one.
BugTraq ID: 9377|
Common Vulnerability Exposure (CVE) ID: CVE-2003-1022
Computer Incident Advisory Center Bulletin: O-048
Debian Security Information: DSA-416 (Google Search)
XForce ISS Database: fspsuite-dot-directory-traversal(14154)
|Copyright||Copyright (C) 2004 Noam Rathaus|
|This is only one of 87302 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.