First published: Wed Apr 18 2018(Updated: )
nmap version 6.49BETA6 through 7.60, up to and including SVN revision 37147 contains a Directory Traversal vulnerability in NSE script http-fetch that can result in file overwrite as the user is running it. This attack appears to be exploitable via a victim that runs NSE script http-fetch against a malicious web site. This vulnerability appears to have been fixed in 7.7.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
libpcap | =6.49-beta6 | |
libpcap | =7.00 | |
libpcap | =7.01 | |
libpcap | =7.10 | |
libpcap | =7.11 | |
libpcap | =7.12 | |
libpcap | =7.25-beta1 | |
libpcap | =7.25-beta2 | |
libpcap | =7.30 | |
libpcap | =7.31 | |
libpcap | =7.40 | |
libpcap | =7.50 | |
libpcap | =7.60 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-1000161 is classified as a critical severity vulnerability due to its potential for file overwrite during scripting execution.
To fix CVE-2018-1000161, upgrade your Nmap installation to version 7.70 or later.
CVE-2018-1000161 affects Nmap versions from 6.49BETA6 to 7.60.
CVE-2018-1000161 is a directory traversal vulnerability associated with the http-fetch NSE script.
Yes, CVE-2018-1000161 can be exploited if a victim runs the affected NSE script in an open and vulnerable environment.