Vulnerabilities > CVE-2006-1160 - Input Validation vulnerability in EFS Software EFS web Server 3.2

047910
CVSS 4.3 - MEDIUM
Attack vector
NETWORK
Attack complexity
MEDIUM
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
PARTIAL
Availability impact
NONE
network
efs-software
nessus

Summary

Cross-site scripting (XSS) vulnerability in Easy File Sharing (EFS) Web Server 3.2 allows remote attackers to inject arbitrary web script or HTML via the Description field in creating a folder or uploading a file.

Vulnerable Configurations

Part Description Count
Application
Efs_Software
1

Nessus

NASL familyWeb Servers
NASL idEFS_FORMAT_STRING.NASL
descriptionThe remote host is running Easy File Sharing Web Server, a file sharing application / web server for Windows. The version of Easy File Sharing Web Server installed on the remote host may crash if it receives requests with an option parameter consisting of a format string. It is unknown whether this issue can be exploited to execute arbitrary code on the remote host, although it is likely the case. In addition, the application reportedly allows remote users to upload arbitrary files to arbitrary locations on the affected host. An attacker may be able to leverage this issue to completely compromise the host by placing them in the startup folder and waiting for a reboot. Additionally, it fails to sanitize input to the
last seen2020-06-01
modified2020-06-02
plugin id21039
published2006-03-10
reporterThis script is Copyright (C) 2006-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/21039
titleEasy File Sharing Web Server Multiple Remote Vulnerabilities (FS, XSS, Upload)