Vulnerabilities > CVE-2007-0888 - Directory Traversal vulnerability in Kiwi CatTools TFTP
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
COMPLETE Integrity impact
COMPLETE Availability impact
COMPLETE Summary
Directory traversal vulnerability in the TFTP server in Kiwi CatTools before 3.2.0 beta allows remote attackers to read arbitrary files, and upload files to arbitrary locations, via ..// (dot dot) sequences in the pathname argument to an FTP (1) GET or (2) PUT command. This vulnerability is addressed in the following product update: Kiwi Enterprises, Kiwi CatTools, 3.2.0 Beta
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Exploit-Db
description | Kiwi CatTools TFTP <= 3.2.8 Remote Path Traversal Vulnerability. CVE-2007-0888. Remote exploit for windows platform |
id | EDB-ID:3380 |
last seen | 2016-01-31 |
modified | 2007-02-27 |
published | 2007-02-27 |
reporter | Sergey Gordeychik |
source | https://www.exploit-db.com/download/3380/ |
title | Kiwi CatTools TFTP <= 3.2.8 - Remote Path Traversal Vulnerability |
Nessus
NASL family | Misc. |
NASL id | KIWI_CATTOOLS_TFTPD_DIR_TRAVERSAL.NASL |
description | The remote host appears to be running Kiwi CatTools, a freeware application for device configuration management. The TFTP server included with the version of Kiwi CatTools installed on the remote host fails to sanitize filenames of directory traversal sequences. An attacker can exploit this issue to get or put arbitrary files on the affected host subject to the privileges of the user id under which the server operates, LOCAL SYSTEM by default. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 24747 |
published | 2007-03-01 |
reporter | This script is Copyright (C) 2007-2018 Ferdy Riphagen |
source | https://www.tenable.com/plugins/nessus/24747 |
title | Kiwi CatTools < 3.2.9 TFTP Server Traversal Arbitrary File Manipulation |
code |
|
References
- http://secunia.com/advisories/24103
- http://securityreason.com/securityalert/2236
- http://www.kiwisyslog.com/kb/idx/5/178/article/
- http://www.osvdb.org/33162
- http://www.securityfocus.com/archive/1/459500/100/0/threaded
- http://www.securityfocus.com/archive/1/459933/100/0/threaded
- http://www.securityfocus.com/bid/22490
- http://www.vupen.com/english/advisories/2007/0536
- https://exchange.xforce.ibmcloud.com/vulnerabilities/32398