2 results (0.002 seconds)

CVSS: 5.3EPSS: 0%CPEs: 1EXPL: 0

In NetIQ Sentinel before 8.1.x, a Sentinel user is logged into the Sentinel Web Interface. After performing some tasks within Sentinel the user does not log out but does go idle for a period of time. This in turn causes the interface to timeout so that it requires the user to re-authenticate. If another user is passing by and decides to login, their credentials are accepted. While The user does not inherit any of the other users privileges, they are able to view the previous screen. • https://www.netiq.com/support/kb/doc.php?id=7022706 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 6.8EPSS: 39%CPEs: 2EXPL: 0

Directory traversal vulnerability in the ReportViewServlet servlet in the server in NetIQ Sentinel 7.4.x before 7.4.2 allows remote attackers to read arbitrary files via a PREVIEW value for the fileType field. Vulnerabilidad de salto de directorio en el servlet ReportViewServlet en NetIQ Sentinel 7.4.x en versiones anteriores a 7.4.2 permite a atacantes remotos leer archivos arbitrarios a través de un valor PREVIEW para el archivo fileType. This vulnerability allows remote attackers to disclose arbitrary file contents on vulnerable installations of Novell NetIQ Sentinel Server. Authentication is required to exploit this vulnerability but it can be bypassed using a separate flaw within the LogonFormController. The specific flaw exists within the ReportViewServlet servlet. When fileType is specified as "PREVIEW", the fileName parameter is vulnerable to directory traversal. • http://www.zerodayinitiative.com/advisories/ZDI-16-406 https://www.netiq.com/support/kb/doc.php?id=7017803 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •