CVE-2024-41784

IBM Sterling Secure Proxy 6.0.0.0, 6.0.0.1, 6.0.0.2, 6.0.0.3, and 6.1.0.0 could allow a remote attacker to traverse directories on the system. An attacker could send a specially crafted URL request containing "dot dot dot" sequences (/.../) to view arbitrary files on the system.
References
Link Resource
https://www.ibm.com/support/pages/node/7173631 Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:ibm:sterling_secure_proxy:6.0.0.0:*:*:*:*:*:*:*
cpe:2.3:a:ibm:sterling_secure_proxy:6.0.1.0:*:*:*:*:*:*:*
cpe:2.3:a:ibm:sterling_secure_proxy:6.0.2.0:*:*:*:*:*:*:*
cpe:2.3:a:ibm:sterling_secure_proxy:6.0.3.0:*:*:*:*:*:*:*
cpe:2.3:a:ibm:sterling_secure_proxy:6.1.0:*:*:*:*:*:*:*

History

20 Nov 2024, 14:35

Type Values Removed Values Added
References () https://www.ibm.com/support/pages/node/7173631 - () https://www.ibm.com/support/pages/node/7173631 - Vendor Advisory
First Time Ibm sterling Secure Proxy
Ibm
CWE CWE-22
CPE cpe:2.3:a:ibm:sterling_secure_proxy:6.0.1.0:*:*:*:*:*:*:*
cpe:2.3:a:ibm:sterling_secure_proxy:6.0.0.0:*:*:*:*:*:*:*
cpe:2.3:a:ibm:sterling_secure_proxy:6.1.0:*:*:*:*:*:*:*
cpe:2.3:a:ibm:sterling_secure_proxy:6.0.3.0:*:*:*:*:*:*:*
cpe:2.3:a:ibm:sterling_secure_proxy:6.0.2.0:*:*:*:*:*:*:*

18 Nov 2024, 17:11

Type Values Removed Values Added
Summary
  • (es) IBM Sterling Secure Proxy 6.0.0.0, 6.0.0.1, 6.0.0.2, 6.0.0.3 y 6.1.0.0 podría permitir que un atacante remoto recorra directorios en el sistema. Un atacante podría enviar una solicitud de URL especialmente manipulada que contenga secuencias "punto punto punto" (/.../) para ver archivos arbitrarios en el sistema.

15 Nov 2024, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-11-15 16:15

Updated : 2024-11-20 14:35


NVD link : CVE-2024-41784

Mitre link : CVE-2024-41784

CVE.ORG link : CVE-2024-41784


JSON object : View

Products Affected

ibm

  • sterling_secure_proxy
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

CWE-32

Path Traversal: '...' (Triple Dot)