Summary
This host is running Aspen Server and is prone to directory traversal vulnerability.
Impact
Successful exploitation will allow attackers to perform directory traversal attacks and read arbitrary files on the affected application.
Impact Level: Application
Solution
Upgrade to Aspen Server 0.22 or later,
For updates refer to http://aspen.io
Insight
The flaw is due to the program not properly sanitizing user supplied input.
Affected
Aspen Server version 0.8 and prior
References
Severity
Classification
-
CVE CVE-2013-2619 -
CVSS Base Score: 5.0
AV:N/AC:L/Au:N/C:P/I:N/A:N
Related Vulnerabilities
- IBM WebSphere Application Server Admin Console Cross-site Scripting Vulnerability
- Apache Tomcat Partial HTTP Requests DoS Vulnerability (Windows)
- JBoss Enterprise Application Platform Multiple Vulnerabilities
- Authentication bypassing in Lotus Domino
- Herberlin Bremsserver Directory Traversal Vulnerability