NTT Data TERASOLUNA Server Framework for Java(WEB) 2.0.0.1 through 2.0.6.1, as used in Fujitsu Interstage Business Application Server and other products, allows remote attackers to bypass a file-extension protection mechanism, and consequently read arbitrary files, via a crafted pathname.
References
Link | Resource |
---|---|
http://jvn.jp/en/jp/JVN74659077/index.html | Vendor Advisory |
http://jvndb.jvn.jp/jvndb/JVNDB-2016-000098 | Vendor Advisory |
http://www.fujitsu.com/jp/products/software/resources/condition/security/vulnerabilities/2016/index.html#CVE-2016-1183 | Vendor Advisory |
http://jvn.jp/en/jp/JVN74659077/index.html | Vendor Advisory |
http://jvndb.jvn.jp/jvndb/JVNDB-2016-000098 | Vendor Advisory |
http://www.fujitsu.com/jp/products/software/resources/condition/security/vulnerabilities/2016/index.html#CVE-2016-1183 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:45
Type | Values Removed | Values Added |
---|---|---|
References | () http://jvn.jp/en/jp/JVN74659077/index.html - Vendor Advisory | |
References | () http://jvndb.jvn.jp/jvndb/JVNDB-2016-000098 - Vendor Advisory | |
References | () http://www.fujitsu.com/jp/products/software/resources/condition/security/vulnerabilities/2016/index.html#CVE-2016-1183 - Vendor Advisory |
Information
Published : 2016-06-19 01:59
Updated : 2024-11-21 02:45
NVD link : CVE-2016-1183
Mitre link : CVE-2016-1183
CVE.ORG link : CVE-2016-1183
JSON object : View
Products Affected
nttdata
- terasoluna_server_framework_for_java_web
CWE
CWE-264
Permissions, Privileges, and Access Controls