CVE-2018-1000161
Published: 18 April 2018
nmap version 6.49BETA6 through 7.60, up to and including SVN revision 37147 contains a Directory Traversal vulnerability in NSE script http-fetch that can result in file overwrite as the user is running it. This attack appears to be exploitable via a victim that runs NSE script http-fetch against a malicious web site. This vulnerability appears to have been fixed in 7.7.
Priority
Status
Package | Release | Status |
---|---|---|
nmap Launchpad, Ubuntu, Debian |
groovy |
Ignored
(end of life)
|
focal |
Not vulnerable
(7.80+dfsg1-2build1)
|
|
impish |
Not vulnerable
(7.91+dfsg1+really7.80+dfsg1-2)
|
|
trusty |
Not vulnerable
(code not present)
|
|
upstream |
Released
(7.70)
|
|
hirsute |
Ignored
(end of life)
|
|
jammy |
Not vulnerable
(7.91+dfsg1+really7.80+dfsg1-2build1)
|
|
xenial |
Needed
|
|
kinetic |
Not vulnerable
(7.91+dfsg1+really7.80+dfsg1-2build1)
|
|
lunar |
Not vulnerable
(7.91+dfsg1+really7.80+dfsg1-2build1)
|
|
artful |
Ignored
(end of life)
|
|
bionic |
Needed
|
|
cosmic |
Ignored
(end of life)
|
|
disco |
Not vulnerable
(7.70+dfsg1-6)
|
|
eoan |
Ignored
(end of life)
|
|
mantic |
Not vulnerable
(7.91+dfsg1+really7.80+dfsg1-2build1)
|
|
Patches: upstream: https://github.com/nmap/nmap/commit/098e32713650f54732472f31245b7eca936b2bd8 upstream: https://github.com/nmap/nmap/commit/da0c861299ae1ce6268e9591838f7a1144b327d7 upstream: https://github.com/nmap/nmap/commit/88631b50676c38824e01d30819f46258a8497b0a upstream: https://github.com/nmap/nmap/commit/80e1977308e51b1b7aa038a38f8837a7e90b3849 |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 5.7 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | Low |
User interaction | Required |
Scope | Unchanged |
Confidentiality | None |
Integrity impact | High |
Availability impact | None |
Vector | CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N |