stconf.nsf in IBM Sametime Meeting Server 8.5.1 relies on the client to validate the file format used in wAttach?OpenForm multipart/form-data POST requests, which allows remote authenticated users to bypass intended upload restrictions by modifying the Content-Type header and file extension, as demonstrated by replacing a text/plain .txt upload with an application/octet-stream .exe upload.
References
Configurations
History
21 Nov 2024, 02:07
Type | Values Removed | Values Added |
---|---|---|
References | () http://linux.oracle.com/errata/ELSA-2014-0747.html - | |
References | () http://packetstormsecurity.com/files/127294 - | |
References | () http://packetstormsecurity.com/files/127829/IBM-Sametime-Meet-Server-8.5-Arbitrary-File-Upload.html - | |
References | () http://www.securityfocus.com/bid/68291 - |
Information
Published : 2014-07-01 20:55
Updated : 2024-11-21 02:07
NVD link : CVE-2014-3088
Mitre link : CVE-2014-3088
CVE.ORG link : CVE-2014-3088
JSON object : View
Products Affected
ibm
- sametime_meeting_server
CWE
CWE-264
Permissions, Privileges, and Access Controls