Novell NetBasic Scripting Handler (NSN) URL encoded backslash directory traversal
|novell-netbasic-directory-traversal (9910)||Medium Risk|
NetBasic Scripting Handler (NSN) could allow a remote attacker to traverse directories on the Web server. A remote attacker could send a specially-crafted URL request containing "dot dot" sequences with hexadecimal URL encoded backslash characters (%5) to traverse directories and gain unauthorized access to directories and files.
Apply the patch for this vulnerability, as listed in Novell Technical Information Document 2963297. See References.
- BugTraq Mailing List, Tue Aug 20 2002 - 11:06:57 CDT: NetBasic Buffer Overflow + Scripting Vulnerability.
- Novell Technical Information Document 2963297: NetBasic buffer/scripting vulnerabiltiy patch.
- BID-5523: Novell NetBasic Scripting Server Directory Traversal Vulnerability
- CVE-2002-1417: Directory traversal vulnerability in Novell NetBasic Scripting Server (NSN) for Netware 5.1 and 6, and Novell Small Business Suite 5.1 and 6, allows remote attackers to read arbitrary files via a URL containing a ..%5c sequence (modified dot-dot), which is mapped to the directory separator.
- OSVDB ID: 8943: Novell NetBasic Scripting Server Encoded Traversal Arbitrary File Access
- Novell NetWare 5.1
- Novell NetWare 6.0
- Novell Small Business Suite 5.1
- Novell Small Business Suite 6.0
Aug 20, 2002