This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Netgain Enterprise Manager. Authentication is not required to exploit this vulnerability. The specific flaw exists within upload_save_do.jsp. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code under the context of the current user. Was ZDI-CAN-4751.
References
Link | Resource |
---|---|
https://www.tenable.com/security/research/tra-2018-02 | Third Party Advisory |
https://zerodayinitiative.com/advisories/ZDI-17-952 | Third Party Advisory VDB Entry |
https://www.tenable.com/security/research/tra-2018-02 | Third Party Advisory |
https://zerodayinitiative.com/advisories/ZDI-17-952 | Third Party Advisory VDB Entry |
Configurations
History
21 Nov 2024, 03:16
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.tenable.com/security/research/tra-2018-02 - Third Party Advisory | |
References | () https://zerodayinitiative.com/advisories/ZDI-17-952 - Third Party Advisory, VDB Entry |
Information
Published : 2018-01-23 01:29
Updated : 2024-11-21 03:16
NVD link : CVE-2017-16610
Mitre link : CVE-2017-16610
CVE.ORG link : CVE-2017-16610
JSON object : View
Products Affected
netgain-systems
- enterprise_manager