Multiple directory traversal vulnerabilities in Bitdefender GravityZone before 5.1.11.432 allow remote attackers to read arbitrary files via a (1) .. (dot dot) in the id parameter to webservice/CORE/downloadFullKitEpc/a/1 in the Web Console or (2) %2E%2E (encoded dot dot) in the default URI to port 7074 on the Update Server.
References
Configurations
History
21 Nov 2024, 02:11
Type | Values Removed | Values Added |
---|---|---|
References | () http://seclists.org/fulldisclosure/2014/Jul/78 - Exploit | |
References | () http://www.bitdefender.com/support/how-to-configure-iptables-firewall-rules-on-gravityzone-for-restricting-outside-access-to-mongodatabase-1265.html - | |
References | () https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20140716-3_Bitdefender_GravityZone_Multiple_critical_vulnerabilities_v10.txt - Exploit |
Information
Published : 2014-08-19 19:55
Updated : 2024-11-21 02:11
NVD link : CVE-2014-5350
Mitre link : CVE-2014-5350
CVE.ORG link : CVE-2014-5350
JSON object : View
Products Affected
bitdefender
- gravityzone
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')