Summary
This host is running Aspen Server and is prone to directory traversal vulnerability.
Impact
Successful exploitation will allow attackers to perform directory traversal attacks and read arbitrary files on the affected application.
Impact Level: Application
Solution
Upgrade to Aspen Server 0.22 or later,
For updates refer to http://aspen.io
Insight
The flaw is due to the program not properly sanitizing user supplied input.
Affected
Aspen Server version 0.8 and prior
References
Severity
Classification
-
CVE CVE-2013-2619 -
CVSS Base Score: 5.0
AV:N/AC:L/Au:N/C:P/I:N/A:N
Related Vulnerabilities
- IBM WebSphere Application Multiple Vulnerabilities Jul-11
- GoAhead Webserver Multiple Stored Cross Site Scripting Vulnerabilities
- Acritum Femitter Server HTTP Request Remote File Disclosure Vulnerability
- Apache Tomcat Partial HTTP Requests DoS Vulnerability (Windows)
- Apache HTTP Server mod_proxy_ajp Process Timeout DoS Vulnerability (Windows)