CVE-2019-16278
CRITICAL
9,8
Source: [email protected]
Attack Vector: network
Attack Complexity: low
Privileges Required: none
User Interaction: none
Scope: unchanged
Confidentiality: high
Integrity: high
Availability: high
HIGH
7,5
Source: [email protected]
Access Vector: network
Access Complexity: low
Authentication: none
Confidentiality: partial
Integrity: partial
Availability: partial
Description
AI Translation Available
Directory Traversal in the function http_verify in nostromo nhttpd through 1.9.6 allows an attacker to achieve remote code execution via a crafted HTTP request.
EPSS (Exploit Prediction Scoring System)
Trend Analysis
EPSS (Exploit Prediction Scoring System)
Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.
EPSS Score
0,9439
Percentile
1,0th
Updated
EPSS Score Trend (Last 91 Days)
22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
StableCommon Consequences
Security Scopes Affected:
Integrity
Confidentiality
Availability
Potential Impacts:
Execute Unauthorized Code Or Commands
Modify Files Or Directories
Read Files Or Directories
Dos: Crash, Exit, Or Restart
Applicable Platforms
Technologies:
AI/ML
Exploit
Nostromo - Directory Traversal Remote Command Execution (Metasploit)
Verified Metasploit Framework (MSF)Nostromo - Directory Traversal Remote Command Execution (Metasploit)
View Exploit Code →
Exploit
nostromo 1.9.6 - Remote Code Execution
Verifiednostromo 1.9.6 - Remote Code Execution
View Exploit Code →
Application
Nostromo Nhttpd by Nazgul
Version Range Affected
To
1.9.7
(exclusive)
CPE Identifier
View Detailed Analysis
cpe:2.3:a:nazgul:nostromo_nhttpd:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2019…
http://packetstormsecurity.com/files/155045/Nostromo-1.9.6-Directory-Traversal-…
http://packetstormsecurity.com/files/155802/nostromo-1.9.6-Remote-Code-Executio…
https://git.sp0re.sh/sp0re/Nhttpd-exploits
https://sp0re.sh
http://www.nazgul.ch/dev/nostromo_cl.txt
http://packetstormsecurity.com/files/155045/Nostromo-1.9.6-Directory-Traversal-…
http://packetstormsecurity.com/files/155802/nostromo-1.9.6-Remote-Code-Executio…
https://git.sp0re.sh/sp0re/Nhttpd-exploits
https://sp0re.sh
http://www.nazgul.ch/dev/nostromo_cl.txt