Directory traversal vulnerability in the JobScheduler Operations Center (JOC) in SOS JobScheduler before 1.6.4246 and 1.7.x before 1.7.4241 allows remote authenticated users with the info permission to read arbitrary files in the webroot via unspecified vectors.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:11
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/128192/JobScheduler-Path-Traversal.html - Exploit | |
References | () http://www.christian-schneider.net/advisories/CVE-2014-5393.txt - Exploit | |
References | () http://www.securityfocus.com/archive/1/533373/100/0/threaded - | |
References | () http://www.sos-berlin.com/modules/news/article.php?storyid=73 - Vendor Advisory | |
References | () http://www.sos-berlin.com/modules/news/article.php?storyid=74 - Vendor Advisory | |
References | () https://change.sos-berlin.com/browse/JS-1205 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/95796 - |
Information
Published : 2014-09-11 15:55
Updated : 2024-11-21 02:11
NVD link : CVE-2014-5393
Mitre link : CVE-2014-5393
CVE.ORG link : CVE-2014-5393
JSON object : View
Products Affected
sos
- jobscheduler
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')