Vulnerabilities > CVE-2007-0888 - Unspecified vulnerability in Kiwi Enterprises Kiwi Cattools
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Directory traversal vulnerability in the TFTP server in Kiwi CatTools before 3.2.0 beta allows remote attackers to read arbitrary files, and upload files to arbitrary locations, via ..// (dot dot) sequences in the pathname argument to an FTP (1) GET or (2) PUT command.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Exploit-Db
description | Kiwi CatTools TFTP <= 3.2.8 Remote Path Traversal Vulnerability. CVE-2007-0888. Remote exploit for windows platform |
id | EDB-ID:3380 |
last seen | 2016-01-31 |
modified | 2007-02-27 |
published | 2007-02-27 |
reporter | Sergey Gordeychik |
source | https://www.exploit-db.com/download/3380/ |
title | Kiwi CatTools TFTP <= 3.2.8 - Remote Path Traversal Vulnerability |
Nessus
NASL family | Misc. |
NASL id | KIWI_CATTOOLS_TFTPD_DIR_TRAVERSAL.NASL |
description | The remote host appears to be running Kiwi CatTools, a freeware application for device configuration management. The TFTP server included with the version of Kiwi CatTools installed on the remote host fails to sanitize filenames of directory traversal sequences. An attacker can exploit this issue to get or put arbitrary files on the affected host subject to the privileges of the user id under which the server operates, LOCAL SYSTEM by default. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 24747 |
published | 2007-03-01 |
reporter | This script is Copyright (C) 2007-2018 Ferdy Riphagen |
source | https://www.tenable.com/plugins/nessus/24747 |
title | Kiwi CatTools < 3.2.9 TFTP Server Traversal Arbitrary File Manipulation |
code |
|
References
- http://secunia.com/advisories/24103
- http://secunia.com/advisories/24103
- http://securityreason.com/securityalert/2236
- http://securityreason.com/securityalert/2236
- http://www.kiwisyslog.com/kb/idx/5/178/article/
- http://www.kiwisyslog.com/kb/idx/5/178/article/
- http://www.osvdb.org/33162
- http://www.osvdb.org/33162
- http://www.securityfocus.com/archive/1/459500/100/0/threaded
- http://www.securityfocus.com/archive/1/459500/100/0/threaded
- http://www.securityfocus.com/archive/1/459933/100/0/threaded
- http://www.securityfocus.com/archive/1/459933/100/0/threaded
- http://www.securityfocus.com/bid/22490
- http://www.securityfocus.com/bid/22490
- http://www.vupen.com/english/advisories/2007/0536
- http://www.vupen.com/english/advisories/2007/0536
- https://exchange.xforce.ibmcloud.com/vulnerabilities/32398
- https://exchange.xforce.ibmcloud.com/vulnerabilities/32398