Summary
This host is running YelloSoft Pinky and is prone to Directory Traversal vulnerability.
Impact
Successful exploitation will allow attacker to gain information about directory and file locations.
Impact Level: System/Application.
Solution
No solution or patch was made available for at least one year since disclosure of this vulnerability. Likely none will be provided anymore.
General solution options are to upgrade to a newer release, disable respective features, remove the product or replace the product by another one.
Insight
Input passed via the URL is not properly verified before being used to read files. This can be exploited to download arbitrary files via directory traversal attacks.
Affected
Yellosoft pinky version 1.0 and prior on windows.
References
Severity
Classification
-
CVE CVE-2010-3487 -
CVSS Base Score: 5.0
AV:N/AC:L/Au:N/C:P/I:N/A:N
Related Vulnerabilities
- 7Media Web Solutions EduTrac Directory Traversal Vulnerability
- Admidio get_file.php Remote File Disclosure Vulnerability
- Apache Tomcat Cross-Site Scripting and Security Bypass Vulnerabilities
- Apache Tomcat HTTP BIO Connector Information Disclosure Vulnerability
- Adiscon LogAnalyzer 'highlight' Parameter Cross Site Scripting Vulnerability