发布时间 :2001-07-26 00:00:00
修订时间 :2017-10-09 21:30:00

[原文]Directory traversal vulnerability in SnapStream PVS 1.2a allows remote attackers to read arbitrary files via a .. (dot dot) attack in the requested URL.

[CNNVD]SnapStream PVS文件泄露漏洞(CNNVD-200107-177)

        SnapStream PVS 1.2a存在目录遍历漏洞。远程攻击者可以借助URL请求的一个..(点 点)攻击读取任意文件。

- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)


- OVAL (用于检测的技术细节)


- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD
(官方数据源) CNNVD

- 其它链接及资源
(VENDOR_ADVISORY)  BUGTRAQ  20010726 Snapstream PVS vulnerability
(UNKNOWN)  XF  snapstream-dot-directory-traversal(6917)

- 漏洞信息

SnapStream PVS文件泄露漏洞
高危 路径遍历
2001-07-26 00:00:00 2005-05-02 00:00:00
        SnapStream PVS 1.2a存在目录遍历漏洞。远程攻击者可以借助URL请求的一个..(点 点)攻击读取任意文件。

- 公告与补丁


- 漏洞信息 (21030)

Snapstream Personal Video Station 1.2 a PVS Directory Traversal Vulnerability (EDBID:21030)
windows remote
2001-07-26 Verified
N/A [点击下载]

Snapstream Personal Video Station is an application for Microsoft Windows which allows users to record video output on their PC and view it at a later time, locally or via an HTTP interface. The Snapstream PVS web interface runs on port 8129.

Snapstream PVS is prone to attacks which allow a remote user to break out of the wwwroot and browse the filesystem at large. The remote attacker may accomplish this by crafting a web request which uses '../' sequences to traverse directories and access arbitrary web-readable files.

The impact of exploiting this vulnerability is that confidential information may be disclosed to the attacker and follow-up attacks against the host may occur.

If exploited conjunction with Bugtraq ID 3101, a remote attacker can gain the administrative password for Snapstream.		

- 漏洞信息

Snapstream Personal Video Station (PVS) URI Traversal Arbitrary File Access
Remote / Network Access Input Manipulation
Loss of Confidentiality, Loss of Integrity
Exploit Public

- 漏洞描述

SnapStream PVS contains a flaw that allows a remote attacker to access arbitrary files outside of the web path. The issue is due to the server not properly sanitizing user input, specifically traversal style attacks (../../) supplied via the URI.

- 时间线

2001-07-26 Unknow
2001-07-26 Unknow

- 解决方案

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

- 相关参考

- 漏洞作者

Unknown or Incomplete