CVE-2012-4834

Directory traversal vulnerability in LayerLoader.jsp in the theme component in IBM WebSphere Portal 7.0.0.1 and 7.0.0.2 before CF19 and 8.0 before CF03 allows remote attackers to read arbitrary files via a crafted URI.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:ibm:websphere_portal:7.0.0.1:*:*:*:*:*:*:*
cpe:2.3:a:ibm:websphere_portal:7.0.0.1:cf002:*:*:*:*:*:*
cpe:2.3:a:ibm:websphere_portal:7.0.0.1:cf003:*:*:*:*:*:*
cpe:2.3:a:ibm:websphere_portal:7.0.0.1:cf004:*:*:*:*:*:*
cpe:2.3:a:ibm:websphere_portal:7.0.0.1:cf005:*:*:*:*:*:*
cpe:2.3:a:ibm:websphere_portal:7.0.0.1:cf006:*:*:*:*:*:*
cpe:2.3:a:ibm:websphere_portal:7.0.0.1:cf007:*:*:*:*:*:*
cpe:2.3:a:ibm:websphere_portal:7.0.0.1:cf008:*:*:*:*:*:*
cpe:2.3:a:ibm:websphere_portal:7.0.0.1:cf009:*:*:*:*:*:*
cpe:2.3:a:ibm:websphere_portal:7.0.0.1:cf010:*:*:*:*:*:*
cpe:2.3:a:ibm:websphere_portal:7.0.0.1:cf011:*:*:*:*:*:*
cpe:2.3:a:ibm:websphere_portal:7.0.0.1:cf012:*:*:*:*:*:*
cpe:2.3:a:ibm:websphere_portal:7.0.0.1:cf013:*:*:*:*:*:*
cpe:2.3:a:ibm:websphere_portal:7.0.0.1:cf014:*:*:*:*:*:*
cpe:2.3:a:ibm:websphere_portal:7.0.0.1:cf015:*:*:*:*:*:*
cpe:2.3:a:ibm:websphere_portal:7.0.0.1:cf016:*:*:*:*:*:*
cpe:2.3:a:ibm:websphere_portal:7.0.0.1:cf017:*:*:*:*:*:*
cpe:2.3:a:ibm:websphere_portal:7.0.0.1:cf018:*:*:*:*:*:*
cpe:2.3:a:ibm:websphere_portal:7.0.0.2:*:*:*:*:*:*:*
cpe:2.3:a:ibm:websphere_portal:7.0.0.2:cf002:*:*:*:*:*:*
cpe:2.3:a:ibm:websphere_portal:7.0.0.2:cf003:*:*:*:*:*:*
cpe:2.3:a:ibm:websphere_portal:7.0.0.2:cf004:*:*:*:*:*:*
cpe:2.3:a:ibm:websphere_portal:7.0.0.2:cf005:*:*:*:*:*:*
cpe:2.3:a:ibm:websphere_portal:7.0.0.2:cf006:*:*:*:*:*:*
cpe:2.3:a:ibm:websphere_portal:7.0.0.2:cf007:*:*:*:*:*:*
cpe:2.3:a:ibm:websphere_portal:7.0.0.2:cf008:*:*:*:*:*:*
cpe:2.3:a:ibm:websphere_portal:7.0.0.2:cf009:*:*:*:*:*:*
cpe:2.3:a:ibm:websphere_portal:7.0.0.2:cf010:*:*:*:*:*:*
cpe:2.3:a:ibm:websphere_portal:7.0.0.2:cf011:*:*:*:*:*:*
cpe:2.3:a:ibm:websphere_portal:7.0.0.2:cf012:*:*:*:*:*:*
cpe:2.3:a:ibm:websphere_portal:7.0.0.2:cf013:*:*:*:*:*:*
cpe:2.3:a:ibm:websphere_portal:7.0.0.2:cf014:*:*:*:*:*:*
cpe:2.3:a:ibm:websphere_portal:7.0.0.2:cf015:*:*:*:*:*:*
cpe:2.3:a:ibm:websphere_portal:7.0.0.2:cf016:*:*:*:*:*:*
cpe:2.3:a:ibm:websphere_portal:7.0.0.2:cf017:*:*:*:*:*:*
cpe:2.3:a:ibm:websphere_portal:7.0.0.2:cf018:*:*:*:*:*:*
cpe:2.3:a:ibm:websphere_portal:8.0.0.0:*:*:*:*:*:*:*
cpe:2.3:a:ibm:websphere_portal:8.0.0.0:cf01:*:*:*:*:*:*
cpe:2.3:a:ibm:websphere_portal:8.0.0.0:cf02:*:*:*:*:*:*

History

21 Nov 2024, 01:43

Type Values Removed Values Added
References () http://secunia.com/advisories/51281 - Third Party Advisory () http://secunia.com/advisories/51281 - Third Party Advisory
References () http://www-01.ibm.com/support/docview.wss?uid=swg1PM76354 - Vendor Advisory () http://www-01.ibm.com/support/docview.wss?uid=swg1PM76354 - Vendor Advisory
References () http://www.ibm.com/connections/blogs/PSIRT/entry/security_vulnerability_in_theme_component_for_websphere_portal_versions_7_0_0_x_and_8_0_cve2012_48344 - Patch, Vendor Advisory () http://www.ibm.com/connections/blogs/PSIRT/entry/security_vulnerability_in_theme_component_for_websphere_portal_versions_7_0_0_x_and_8_0_cve2012_48344 - Patch, Vendor Advisory
References () http://www.ibm.com/support/docview.wss?uid=swg21617713 - Patch, Vendor Advisory () http://www.ibm.com/support/docview.wss?uid=swg21617713 - Patch, Vendor Advisory
References () http://www.ibm.com/support/docview.wss?uid=swg24033155 - Patch, Third Party Advisory () http://www.ibm.com/support/docview.wss?uid=swg24033155 - Patch, Third Party Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/78914 - Third Party Advisory, VDB Entry () https://exchange.xforce.ibmcloud.com/vulnerabilities/78914 - Third Party Advisory, VDB Entry

Information

Published : 2012-11-30 19:55

Updated : 2024-11-21 01:43


NVD link : CVE-2012-4834

Mitre link : CVE-2012-4834

CVE.ORG link : CVE-2012-4834


JSON object : View

Products Affected

ibm

  • websphere_portal
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')