ID

VAR-E-201108-0439


TITLE

CiscoKits CCNA TFTP 'Read' Command Directory Traversal Vulnerability

Trust: 0.3

sources: BID: 49053

DESCRIPTION

CiscoKits CCNA TFTP Server is prone to a directory-traversal vulnerability because it fails to sufficiently sanitize user-supplied input.
Exploiting this issue may allow an attacker to obtain sensitive information that could aid in further attacks.
CiscoKits CCNA TFTP Server 1.0 is vulnerable; other versions may also be affected.

Trust: 0.3

sources: BID: 49053

AFFECTED PRODUCTS

vendor:certificationkitsmodel:ciscokits ccna tftp serverscope:eqversion:1.0

Trust: 0.3

sources: BID: 49053

EXPLOIT

Attackers can exploit this issue through a browser.
The following exploit is available:
Bullet list:
<li><a href="/data/vulnerabilities/exploits/49053.py">/data/vulnerabilities/exploits/49053.py</a></li>

Trust: 0.3

sources: BID: 49053

PRICE

Free

Trust: 0.3

sources: BID: 49053

TYPE

Input Validation Error

Trust: 0.3

sources: BID: 49053

CREDITS

Antu Sanadi of SecPod Research

Trust: 0.3

sources: BID: 49053

EXTERNAL IDS

db:BIDid:49053

Trust: 0.3

sources: BID: 49053

REFERENCES

url:http://secpod.org/advisories/secpod_ciscokits_tftp_server_dir_trav.txt

Trust: 0.3

url:http://www.certificationkits.com/cisco-ccna-tftp-server/

Trust: 0.3

sources: BID: 49053

SOURCES

db:BIDid:49053

LAST UPDATE DATE

2022-07-27T09:50:05.248000+00:00


SOURCES UPDATE DATE

db:BIDid:49053date:2011-08-05T00:00:00

SOURCES RELEASE DATE

db:BIDid:49053date:2011-08-05T00:00:00