Vulnerabilities > CVE-2017-6543 - Unspecified vulnerability in Tenable Nessus
Attack vector
LOCAL Attack complexity
LOW Privileges required
LOW Confidentiality impact
HIGH Integrity impact
HIGH Availability impact
HIGH Summary
Tenable Nessus before 6.10.2 (as used alone or in Tenable Appliance before 4.5.0) was found to contain a flaw that allowed a remote, authenticated attacker to upload a crafted file that could be written to anywhere on the system. This could be used to subsequently gain elevated privileges on the system (e.g., after a reboot). This issue only affects installations on Windows.
Vulnerable Configurations
Nessus
NASL family | Windows |
NASL id | NESSUS_TNS_2017_06.NASL |
description | According to its self-reported version, the Tenable Nessus application running on the remote host is 6.8.x, 6.9.x, or 6.10.x prior to 6.10.2. It is, therefore, affected by an arbitrary file upload vulnerability due to an unspecified flaw. An authenticated, remote attacker can exploit this to upload a specially crafted file to an arbitrary system location. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 99440 |
published | 2017-04-18 |
reporter | This script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof. |
source | https://www.tenable.com/plugins/nessus/99440 |
title | Tenable Nessus 6.8.x < 6.10.2 Arbitrary File Upload (TNS-2017-06) |