CVE-2016-1183

NTT Data TERASOLUNA Server Framework for Java(WEB) 2.0.0.1 through 2.0.6.1, as used in Fujitsu Interstage Business Application Server and other products, allows remote attackers to bypass a file-extension protection mechanism, and consequently read arbitrary files, via a crafted pathname.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:nttdata:terasoluna_server_framework_for_java_web:2.0.0.1:*:*:*:*:*:*:*
cpe:2.3:a:nttdata:terasoluna_server_framework_for_java_web:2.0.0.2:*:*:*:*:*:*:*
cpe:2.3:a:nttdata:terasoluna_server_framework_for_java_web:2.0.1.0:*:*:*:*:*:*:*
cpe:2.3:a:nttdata:terasoluna_server_framework_for_java_web:2.0.2.0:*:*:*:*:*:*:*
cpe:2.3:a:nttdata:terasoluna_server_framework_for_java_web:2.0.5.1:*:*:*:*:*:*:*
cpe:2.3:a:nttdata:terasoluna_server_framework_for_java_web:2.0.5.2:*:*:*:*:*:*:*
cpe:2.3:a:nttdata:terasoluna_server_framework_for_java_web:2.0.5.3:*:*:*:*:*:*:*
cpe:2.3:a:nttdata:terasoluna_server_framework_for_java_web:2.0.6.1:*:*:*:*:*:*:*

History

21 Nov 2024, 02:45

Type Values Removed Values Added
References () http://jvn.jp/en/jp/JVN74659077/index.html - Vendor Advisory () http://jvn.jp/en/jp/JVN74659077/index.html - Vendor Advisory
References () http://jvndb.jvn.jp/jvndb/JVNDB-2016-000098 - Vendor Advisory () http://jvndb.jvn.jp/jvndb/JVNDB-2016-000098 - Vendor Advisory
References () http://www.fujitsu.com/jp/products/software/resources/condition/security/vulnerabilities/2016/index.html#CVE-2016-1183 - Vendor Advisory () http://www.fujitsu.com/jp/products/software/resources/condition/security/vulnerabilities/2016/index.html#CVE-2016-1183 - Vendor Advisory

Information

Published : 2016-06-19 01:59

Updated : 2024-11-21 02:45


NVD link : CVE-2016-1183

Mitre link : CVE-2016-1183

CVE.ORG link : CVE-2016-1183


JSON object : View

Products Affected

nttdata

  • terasoluna_server_framework_for_java_web
CWE
CWE-264

Permissions, Privileges, and Access Controls