Vulnerabilities > CVE-2006-3426
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Directory traversal vulnerability in (a) PatchLink Update Server (PLUS) before 6.1 P1 and 6.2.x before 6.2 SR1 P1 and (b) Novell ZENworks 6.2 SR1 and earlier allows remote attackers to overwrite arbitrary files and directories via a .. (dot dot) sequence in the (1) action, (2) agentid, or (3) index parameters to dagent/nwupload.asp, which are used as pathname components.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 | |
Application | 3 |
Nessus
NASL family | CGI abuses |
NASL id | PLUS_NWUPLOAD_DIR_TRAVERSAL.NASL |
description | The remote host is running PatchLink Update Server, a patch and vulnerability management solution. The version of PatchLink Update Server installed on the remote fails to sanitize input to the |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 22116 |
published | 2006-07-28 |
reporter | This script is Copyright (C) 2006-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/22116 |
title | PatchLink Update Server nwupload.asp Traversal Arbitrary File Write |
code |
|
References
- http://lists.grok.org.uk/pipermail/full-disclosure/2006-June/047495.html
- http://lists.grok.org.uk/pipermail/full-disclosure/2006-June/047495.html
- http://secunia.com/advisories/20876
- http://secunia.com/advisories/20876
- http://secunia.com/advisories/20878
- http://secunia.com/advisories/20878
- http://securityreason.com/securityalert/1200
- http://securityreason.com/securityalert/1200
- http://securitytracker.com/id?1016405
- http://securitytracker.com/id?1016405
- http://www.securityfocus.com/archive/1/438710/100/0/threaded
- http://www.securityfocus.com/archive/1/438710/100/0/threaded
- http://www.securityfocus.com/bid/18732
- http://www.securityfocus.com/bid/18732
- http://www.vupen.com/english/advisories/2006/2595
- http://www.vupen.com/english/advisories/2006/2595
- http://www.vupen.com/english/advisories/2006/2596
- http://www.vupen.com/english/advisories/2006/2596