CVE-2017-15363 Scanner

CVE-2017-15363 scanner - Directory Traversal vulnerability in Luracast Restler and restler extension for TYPO3

Short Info


Level

High

Single Scan

Single Scan

Can be used by

Asset Owner

Estimated Time

10 seconds

Time Interval

1 month 2 days

Scan only one

URL

Toolbox

-

Luracast Restler is a popular framework that is used for developing RESTful APIs. The restler extension before version 1.7.1 for TYPO3 is built on top of the Restler framework and allows for easy integration of RESTful APIs within TYPO3 websites. This extension is widely used in the TYPO3 community to build high-performance and feature-rich websites.

CVE-2017-15363 is a security vulnerability that was detected in the Luracast Restler through version 3.0.0 and is used in the restler extension before version 1.7.1 for TYPO3. The vulnerability is related to directory traversal and can be exploited remotely by attackers to read arbitrary files from the server via the file parameter.

When exploited, the CVE-2017-15363 vulnerability can lead to a significant compromise of sensitive information on the server. By exploiting this vulnerability, attackers could gain unauthorized access to sensitive data such as usernames, passwords, and other confidential information. This can lead to a serious breach of privacy and even financial loss, especially for those businesses that rely heavily on their digital assets.

Thanks to the pro features of s4e.io platform, it is now easier than ever to learn about vulnerabilities in digital assets. By using the platform, businesses and individuals can get comprehensive reports on vulnerabilities that exist within their digital assets. They can also get actionable recommendations on how to fix the vulnerabilities and enhance the security of their digital infrastructure. So, go ahead and explore the platform today to secure your digital assets!

 

REFERENCES

Get started to protecting your Free Full Security Scan