1 results (0.003 seconds)

CVSS: 6.8EPSS: 39%CPEs: 2EXPL: 0

Directory traversal vulnerability in the ReportViewServlet servlet in the server in NetIQ Sentinel 7.4.x before 7.4.2 allows remote attackers to read arbitrary files via a PREVIEW value for the fileType field. Vulnerabilidad de salto de directorio en el servlet ReportViewServlet en NetIQ Sentinel 7.4.x en versiones anteriores a 7.4.2 permite a atacantes remotos leer archivos arbitrarios a través de un valor PREVIEW para el archivo fileType. This vulnerability allows remote attackers to disclose arbitrary file contents on vulnerable installations of Novell NetIQ Sentinel Server. Authentication is required to exploit this vulnerability but it can be bypassed using a separate flaw within the LogonFormController. The specific flaw exists within the ReportViewServlet servlet. When fileType is specified as "PREVIEW", the fileName parameter is vulnerable to directory traversal. • http://www.zerodayinitiative.com/advisories/ZDI-16-406 https://www.netiq.com/support/kb/doc.php?id=7017803 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •