All editions of Rapid7 Metasploit prior to version 4.13.0-2017020701 contain a directory traversal vulnerability in the Meterpreter stdapi Dir.download() function. By using a specially-crafted build of Meterpreter, it is possible to write to an arbitrary directory on the Metasploit console with the permissions of the running Metasploit instance.
References
Link | Resource |
---|---|
https://community.rapid7.com/community/infosec/blog/2017/03/01/multiple-vulnerabilities-affecting-four-rapid7-products | Mitigation Vendor Advisory |
http://www.securityfocus.com/bid/96954 |
Configurations
Information
Published : 2017-03-02 12:59
Updated : 2017-03-20 18:59
NVD link : CVE-2017-5228
Mitre link : CVE-2017-5228
JSON object : View
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Products Affected
rapid7
- metasploit