{"vuid":"VU#701572","idnumber":"701572","name":"Mutiny Appliance contains multiple directory traversal vulnerabilities","keywords":["cwe-22","mutiny","directory traversal"],"overview":"Mutiny appliance contains multiple directory traversal (CWE-22) vulnerabilities.","clean_desc":"The Mutiny appliance commands for UPLOAD, DELETE, CUT and COPY are all vulnerable to directory traversal attacks. Additional details may be found in the Rapid7 blog post entitled, \"New 1day Exploits: Mutiny Vulnerabilities\".","impact":"An authenticated remote attacker may be able to upload, delete, and move files on the system with root privileges.","resolution":"Apply an Update Mutiny appliance version \"5.0-1.11 (EAGLe) - (02-05-13)\" has been released to address these vulnerabilities.","workarounds":"Restrict Network Access As a general good security practice, only allow connections from trusted hosts and networks. Restricting access would prevent an attacker from connecting to the service from a blocked network location.","sysaffected":"","thanks":"Thanks to \nJuan Vazquez for discovering and \nTod Beardsley for reporting this vulnerability.","author":"This document was written by Jared Allar.","public":["https://community.rapid7.com/community/metasploit/blog/2013/05/15/new-1day-exploits-mutiny-vulnerabilities","http://cwe.mitre.org/data/definitions/22.html"],"cveids":["CVE-2013-0136"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2013-04-02T17:18:49Z","publicdate":"2013-05-15T00:00:00Z","datefirstpublished":"2013-05-15T17:15:46Z","dateupdated":"2013-05-15T17:20:19Z","revision":19,"vrda_d1_directreport":"1","vrda_d1_population":"3","vrda_d1_impact":"3","cam_widelyknown":"0","cam_exploitation":"0","cam_internetinfrastructure":"0","cam_population":"0","cam_impact":"0","cam_easeofexploitation":"0","cam_attackeraccessrequired":"0","cam_scorecurrent":"0","cam_scorecurrentwidelyknown":"0","cam_scorecurrentwidelyknownexploited":"0","ipprotocol":"","cvss_accessvector":"N","cvss_accesscomplexity":"M","cvss_authentication":null,"cvss_confidentialityimpact":"C","cvss_integrityimpact":"C","cvss_availabilityimpact":"N","cvss_exploitablity":null,"cvss_remediationlevel":"OF","cvss_reportconfidence":"C","cvss_collateraldamagepotential":"ND","cvss_targetdistribution":"M","cvss_securityrequirementscr":"ND","cvss_securityrequirementsir":"ND","cvss_securityrequirementsar":"ND","cvss_basescore":"7.9","cvss_basevector":"AV:N/AC:M/Au:S/C:C/I:C/A:N","cvss_temporalscore":"6.9","cvss_environmentalscore":"5.2","cvss_environmentalvector":"CDP:ND/TD:M/CR:ND/IR:ND/AR:ND","metric":0.0,"vulnote":null}