CVE-2017-15363 Scanner
CVE-2017-15363 scanner - Directory Traversal vulnerability in Luracast Restler and restler extension for TYPO3
Short Info
Level
High
Single Scan
Single Scan
Can be used by
Asset Owner
Estimated Time
10 seconds
Time Interval
1 month 2 days
Scan only one
URL
Toolbox
-
Luracast Restler is a popular framework that is used for developing RESTful APIs. The restler extension before version 1.7.1 for TYPO3 is built on top of the Restler framework and allows for easy integration of RESTful APIs within TYPO3 websites. This extension is widely used in the TYPO3 community to build high-performance and feature-rich websites.
CVE-2017-15363 is a security vulnerability that was detected in the Luracast Restler through version 3.0.0 and is used in the restler extension before version 1.7.1 for TYPO3. The vulnerability is related to directory traversal and can be exploited remotely by attackers to read arbitrary files from the server via the file parameter.
When exploited, the CVE-2017-15363 vulnerability can lead to a significant compromise of sensitive information on the server. By exploiting this vulnerability, attackers could gain unauthorized access to sensitive data such as usernames, passwords, and other confidential information. This can lead to a serious breach of privacy and even financial loss, especially for those businesses that rely heavily on their digital assets.
Thanks to the pro features of s4e.io platform, it is now easier than ever to learn about vulnerabilities in digital assets. By using the platform, businesses and individuals can get comprehensive reports on vulnerabilities that exist within their digital assets. They can also get actionable recommendations on how to fix the vulnerabilities and enhance the security of their digital infrastructure. So, go ahead and explore the platform today to secure your digital assets!
REFERENCES