PROTOCOL-TFTP -- Snort has detected traffic that may indicate the presence of the tftp protocol or vulnerabilities in the tftp protocol on the network.
PROTOCOL-TFTP parent directory
This rule looks for a path traversal sequence present in TFTP traffic.
This rule alerts on potential path traversal attempts through TFTP.
No public information
Known false positives, with the described conditions
This rule will alert whenever a ".." sequence is detected in TFTP traffic.
Cisco Talos Intelligence Group
MITRE::ATT&CK Framework::Enterprise::Initial Access::Exploit Public-Facing Application
Rule Categories::Protocol::TFTP
Vulnerability::Severity::High
Vulnerability::Severity::Critical
Vulnerability::Severity::Medium
Directory Traversal
A Directory Traversal attack targets HTTP traffic and allows the attacker to access directories outside the applications own, potentially exposing sensitive system files to leakage or overwriting. This is also known as Directory Climbing, Path Traversal, or Backtracking. An alert on this kind of attack indicates a vulnerability in security validation of user input that allows a "traverse to parent directory" or "../" command to pass through. Protect your site by filtering all user input, removing any characters but the allowed data.
CVE-1999-0183 |
Loading description
|
CVE-2002-1209 |
Loading description
|
CVE-2011-4722 |
Loading description
|
CVE-2007-0888 |
Loading description
|