Directory traversal vulnerability in the Admin Center for Tivoli Storage Manager (TSM) in Rocket ServerGraph 1.2 allows remote attackers to (1) create arbitrary files via a .. (dot dot) in the query parameter in a writeDataFile action to the fileRequestor servlet, execute arbitrary files via a .. (dot dot) in the query parameter in a (2) run or (3) runClear action to the fileRequestor servlet, (4) read arbitrary files via a readDataFile action to the fileRequestor servlet, (5) execute arbitrary code via a save_server_groups action to the userRequest servlet, or (6) delete arbitrary files via a del action in the fileRequestServlet servlet.
References
Configurations
History
21 Nov 2024, 02:09
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.exploit-db.com/exploits/33807 - Exploit | |
References | () http://zerodayinitiative.com/advisories/ZDI-14-161/ - | |
References | () http://zerodayinitiative.com/advisories/ZDI-14-162/ - | |
References | () http://zerodayinitiative.com/advisories/ZDI-14-163/ - | |
References | () http://zerodayinitiative.com/advisories/ZDI-14-165/ - | |
References | () http://zerodayinitiative.com/advisories/ZDI-14-166/ - |
Information
Published : 2014-08-07 11:13
Updated : 2024-11-21 02:09
NVD link : CVE-2014-3914
Mitre link : CVE-2014-3914
CVE.ORG link : CVE-2014-3914
JSON object : View
Products Affected
rocketsoftware
- rocket_servergraph
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')