|
Family: CGI abuses --> Category: attack
PIX Firewall Manager Directory Traversal Vulnerability Scan
Vulnerability Scan Summary \..\..\file.txt
Detailed Explanation for this Vulnerability Test
Synopsis :
It is possible to read arbitrary files on the remote host
through the remote web server.
Description :
It is possible to read arbitrary files on this machine by using
relative paths in the URL. This flaw can be used to bypass the
management software's password protection and possibly retrieve
the enable password for the Cisco PIX.
This vulnerability has been assigned Cisco Bug ID: CSCdk39378.
Solution :
Cisco originally recommended upgrading to version 4.1.6b or version
4.2, however the same vulnerability has been found in version 4.3.
Cisco now recommends that you disable the software completely and
migrate to the new PIX Device Manager software.
Threat Level:
Medium / CVSS Base Score : 4
(AV:R/AC:L/Au:NR/C:P/A:N/I:N/B:C)
Click HERE for more information and discussions on this network vulnerability scan.
|