Web Path Directory Traversal in the Novus HTTP Server. The Novus HTTP Server is affected by the Directory Traversal for Arbitrary File Access vulnerability. A remote, unauthenticated attacker using an HTTP GET request may be able to exploit this issue to access sensitive data. The issue was discovered in the NMS (Novus Management System) software through 1.51.2
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/163453/Novus-Management-System-Directory-Traversal-Cross-Site-Scripting.html | Third Party Advisory VDB Entry |
http://seclists.org/fulldisclosure/2021/Jul/20 | Mailing List Third Party Advisory |
http://packetstormsecurity.com/files/163453/Novus-Management-System-Directory-Traversal-Cross-Site-Scripting.html | Third Party Advisory VDB Entry |
http://seclists.org/fulldisclosure/2021/Jul/20 | Mailing List Third Party Advisory |
Configurations
History
21 Nov 2024, 06:11
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/163453/Novus-Management-System-Directory-Traversal-Cross-Site-Scripting.html - Third Party Advisory, VDB Entry | |
References | () http://seclists.org/fulldisclosure/2021/Jul/20 - Mailing List, Third Party Advisory |
Information
Published : 2021-07-19 18:15
Updated : 2024-11-21 06:11
NVD link : CVE-2021-34820
Mitre link : CVE-2021-34820
CVE.ORG link : CVE-2021-34820
JSON object : View
Products Affected
aat
- novus_management_system
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')