Rule Category

PROTOCOL-TFTP -- Snort has detected traffic that may indicate the presence of the tftp protocol or vulnerabilities in the tftp protocol on the network.

Alert Message

PROTOCOL-TFTP parent directory

Rule Explanation

This rule looks for a path traversal sequence present in TFTP traffic.

What To Look For

This rule alerts on potential path traversal attempts through TFTP.

Known Usage

No public information

False Positives

Known false positives, with the described conditions

This rule will alert whenever a ".." sequence is detected in TFTP traffic.

Contributors

Cisco Talos Intelligence Group

Rule Groups

MITRE::ATT&CK Framework::Enterprise::Initial Access::Exploit Public-Facing Application

Rule Categories::Protocol::TFTP

Vulnerability::Severity::High

Vulnerability::Severity::Critical

Vulnerability::Severity::Medium

CVE

Rule Vulnerability

Directory Traversal

A Directory Traversal attack targets HTTP traffic and allows the attacker to access directories outside the applications own, potentially exposing sensitive system files to leakage or overwriting. This is also known as Directory Climbing, Path Traversal, or Backtracking. An alert on this kind of attack indicates a vulnerability in security validation of user input that allows a "traverse to parent directory" or "../" command to pass through. Protect your site by filtering all user input, removing any characters but the allowed data.

CVE Additional Information

This product uses data from the NVD API but is not endorsed or certified by the NVD.
CVE-1999-0183
Loading description
CVE-2002-1209
Loading description
CVE-2011-4722
Loading description
CVE-2007-0888
Loading description