Executive Summary



This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Summary
Title Mutiny Appliance contains multiple directory traversal vulnerabilities
Informations
Name VU#701572 First vendor Publication 2013-05-15
Vendor VU-CERT Last vendor Modification 2013-05-15
Severity (Vendor) N/A Revision M

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:S/C:C/I:C/A:C)
Cvss Base Score 8.5 Attack Range Network
Cvss Impact Score 10 Attack Complexity Medium
Cvss Expoit Score 6.8 Authentication Requires single instance
Calculate full CVSS 2.0 Vectors scores

Detail

Vulnerability Note VU#701572

Mutiny Appliance contains multiple directory traversal vulnerabilities

Original Release date: 15 May 2013 | Last revised: 15 May 2013

Overview

Mutiny appliance contains multiple directory traversal (CWE-22) vulnerabilities.

Description

The Mutiny appliance commands for UPLOAD, DELETE, CUT and COPY are all vulnerable to directory traversal attacks. Additional details may be found in the Rapid7 blog post entitled, "New 1day Exploits: Mutiny Vulnerabilities".

Impact

An authenticated remote attacker may be able to upload, delete, and move files on the system with root privileges.

Solution

Apply an Update

Mutiny appliance version "5.0-1.11 (EAGLe) - (02-05-13)" has been released to address these vulnerabilities.

Restrict Network Access

As a general good security practice, only allow connections from trusted hosts and networks. Restricting access would prevent an attacker from connecting to the service from a blocked network location.

Vendor Information (Learn More)

VendorStatusDate NotifiedDate Updated
Mutiny TechnologiesAffected19 Apr 201315 May 2013
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

GroupScoreVector
Base7.9AV:N/AC:M/Au:S/C:C/I:C/A:N
Temporal6.9E:ND/RL:OF/RC:C
Environmental5.2CDP:ND/TD:M/CR:ND/IR:ND/AR:ND

References

  • https://community.rapid7.com/community/metasploit/blog/2013/05/15/new-1day-exploits-mutiny-vulnerabilities
  • http://cwe.mitre.org/data/definitions/22.html

Credit

Thanks to Juan Vazquez for discovering and Tod Beardsley for reporting this vulnerability.

This document was written by Jared Allar.

Other Information

  • CVE IDs:CVE-2013-0136
  • Date Public:15 May 2013
  • Date First Published:15 May 2013
  • Date Last Updated:15 May 2013
  • Document Revision:17

Feedback

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Original Source

Url : http://www.kb.cert.org/vuls/id/701572

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') (CWE/SANS Top 25)

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 2
Application 1
Hardware 1

Snort® IPS/IDS

Date Description
2014-01-10 Mutiny editdocument servlet arbitrary file upload attempt
RuleID : 26798 - Revision : 4 - Type : SERVER-WEBAPP
2014-01-10 Mutiny editdocument servlet arbitrary file access attempt
RuleID : 26797 - Revision : 4 - Type : SERVER-WEBAPP

Nessus® Vulnerability Scanner

Date Description
2013-05-17 Name : The remote host contains a network monitoring application that is affected by...
File : mutiny_5_0_1_11.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
Date Informations
2020-05-23 13:17:16
  • Multiple Updates
2014-02-17 12:08:07
  • Multiple Updates
2013-07-05 10:07:27
  • Multiple Updates
2013-06-03 21:31:49
  • Multiple Updates
2013-06-01 17:21:47
  • Multiple Updates
2013-05-16 17:18:07
  • Multiple Updates
2013-05-15 21:19:06
  • First insertion