| Title | Nmap におけるパストラバーサルの脆弱性 |
|---|---|
| Summary | Nmap には、パストラバーサルの脆弱性が存在します。 |
| Possible impacts | 情報を改ざんされる可能性があります。 |
| Solution | ベンダより正式な対策が公開されています。ベンダ情報を参照して適切な対策を実施してください。 |
| Publication Date | June 18, 2018, midnight |
| Registration Date | June 20, 2018, 12:11 p.m. |
| Last Update | June 20, 2018, 12:11 p.m. |
| CVSS3.0 : 警告 | |
| Score | 5.7 |
|---|---|
| Vector | CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N |
| CVSS2.0 : 注意 | |
| Score | 3.5 |
|---|---|
| Vector | AV:N/AC:M/Au:S/C:N/I:P/A:N |
| Nmap |
| Nmap 6.49BETA6 から 7.60 |
| No | Changed Details | Date of change |
|---|---|---|
| 1 | [2018年06月20日] 掲載 |
June 20, 2018, 12:11 p.m. |
| Summary | nmap version 6.49BETA6 through 7.60, up to and including SVN revision 37147 contains a Directory Traversal vulnerability in NSE script http-fetch that can result in file overwrite as the user is running it. This attack appears to be exploitable via a victim that runs NSE script http-fetch against a malicious web site. This vulnerability appears to have been fixed in 7.7. |
|---|---|
| Publication Date | April 19, 2018, 4:29 a.m. |
| Registration Date | March 1, 2021, 6:39 p.m. |
| Last Update | Nov. 21, 2024, 12:39 p.m. |
| Configuration1 | or higher | or less | more than | less than | |
| cpe:2.3:a:nmap:nmap:6.49:beta6:*:*:*:*:*:* | |||||
| cpe:2.3:a:nmap:nmap:7.00:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:nmap:nmap:7.01:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:nmap:nmap:7.10:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:nmap:nmap:7.11:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:nmap:nmap:7.12:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:nmap:nmap:7.25:beta1:*:*:*:*:*:* | |||||
| cpe:2.3:a:nmap:nmap:7.25:beta2:*:*:*:*:*:* | |||||
| cpe:2.3:a:nmap:nmap:7.30:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:nmap:nmap:7.31:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:nmap:nmap:7.40:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:nmap:nmap:7.50:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:nmap:nmap:7.60:*:*:*:*:*:*:* | |||||