CVE漏洞中文网

0DayBank一个专门收集整理全球互联网漏洞的公开发布网站
  1. 首页
  2. CVE
  3. 正文

Sun Microsystem's Chili!Soft ASP Sample Scripts Directory Traversal Vulnerability

2016年9月26日 1216点热度 0人点赞 0条评论

漏洞类别:CGI漏洞等级:

漏洞信息

Sun Chili!Soft ASP (CASP) is a cross-platform Active Server Pages implementation for Linux and other platforms, including Lotus Domino, Apache, HP-UX, and AIX.

The default installation of Chili!Soft ASP includes sample scripts which are vulnerable to directory traversal attacks. The vulnerability only allows the attacker to ascend one level in the Web's directory tree. However, in typical CASP configurations, this is the /opt/casp directory, which holds files containing highly sensitive information, such as database usernames and passwords, server logs, and the username and password for CASP's admin console.

漏洞危害

If successfully exploited, a malicious user can gain access to files with highly sensitive information, which could be used to further compromise security on the vulnerable host.

解决方案

For the latest information, visit the Sun Chili!Soft Web site.

0day

标签: 暂无
最后更新:2016年10月22日

小助手

这个人很懒,什么都没留下

点赞
< 上一篇
下一篇 >

文章评论

您需要 登录 之后才可以评论

COPYRIGHT © 2024 www.pdr.cn CVE漏洞中文网. ALL RIGHTS RESERVED.

鲁ICP备2022031030号

联系邮箱:wpbgssyubnmsxxxkkk@proton.me