Directory traversal vulnerability in aws_tmxn.exe in the Admin Agent service in the server in EMC Documentum ApplicationXtender Workflow, possibly 5.40 SP1 and earlier, allows remote attackers to upload arbitrary files, and execute arbitrary code, via directory traversal sequences in requests to TCP port 2606.
References
Link | Resource |
---|---|
http://secunia.com/advisories/37070 | Vendor Advisory |
http://www.zerodayinitiative.com/advisories/ZDI-08-095/ |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2009-10-22 16:00
Updated : 2024-02-28 11:21
NVD link : CVE-2008-3685
Mitre link : CVE-2008-3685
CVE.ORG link : CVE-2008-3685
JSON object : View
Products Affected
emc
- documentum_applicationxtender_workflow_manager
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')