CVE-2012-1047

Loading...

General

Score:7.5/10.0
Severity:High
Category:Path Manipulation
Exploit:Available

Impact Metrics

Confidentiality:Partial
Integrity:Partial
Availability:Partial

Exploitability Metrics

Access Vector:Network
Access Complexity:Low
Authentication:None

Published on 12/02/12 - Updated on 25/02/12

Description

Directory traversal vulnerability in the WWWHELP Service (js/html/wwhelp.htm) in Cyberoam Central Console (CCC) 2.00.2 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the file parameter in an Online_help action.

Category: Path Manipulation

CWE-22 (Path Traversal)
The software uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the software does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.

Security Notices

US National Vulnerability DatabaseCVE-2012-1047

Exploits

Exploit-DBEDB-18473
SecurityFocusBID-51901

Relative technologies

VendorProduct
cyberoamcyberoam_central_console

Share this vulnerability with:

Twitter Facebook LinkedIn Mail