Page 4 of 17 results (0.003 seconds)

CVSS: 10.0EPSS: 96%CPEs: 1EXPL: 0

The userRequest servlet in the Admin Center for Tivoli Storage Manager in Rocket Servergraph allows remote attackers to execute arbitrary commands via a (1) auth, (2) auth_session, (3) auth_simple, (4) add, (5) add_flat, (6) remove, (7) set_pwd, (8) add_permissions, (9) revoke_permissions, (10) runAsync, or (11) tsmRequest command. El servlet userRequest en el centro de administración para Tivoli Storage Manager en Rocket Servergraph permite a atacantes remotos ejecutar comandos arbitrarios a través de un comando (1) auth, (2) auth_session, (3) auth_simple, (4) add, (5) add_flat, (6) remove, (7) set_pwd, (8) add_permissions, (9) revoke_permissions, (10) runAsync o (11) tsmRequest. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Rocket Servergraph Admin Center for Tivoli Storage Manager. Authentication is not required to exploit this vulnerability. The specific flaw exists within the userRequest servlet. It is possible to inject arbitrary operating system commands when the servlet is processing auth, auth_session, auth_simple, add, add_flat, remove, set_pwd, add_permissions, revoke_permissions, runAsync, and tsmRequest commands. • http://www.securityfocus.com/bid/67780 http://www.zerodayinitiative.com/advisories/ZDI-14-164 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 10.0EPSS: 96%CPEs: 1EXPL: 2

Directory traversal vulnerability in the Admin Center for Tivoli Storage Manager (TSM) in Rocket ServerGraph 1.2 allows remote attackers to (1) create arbitrary files via a .. (dot dot) in the query parameter in a writeDataFile action to the fileRequestor servlet, execute arbitrary files via a .. (dot dot) in the query parameter in a (2) run or (3) runClear action to the fileRequestor servlet, (4) read arbitrary files via a readDataFile action to the fileRequestor servlet, (5) execute arbitrary code via a save_server_groups action to the userRequest servlet, or (6) delete arbitrary files via a del action in the fileRequestServlet servlet. Vulnerabilidad de salto de directorio en el centro de administración para Tivoli Storage Manager (TSM) en Rocket ServerGraph 1.2 permite a atacantes remotos (1) crear ficheros arbitrarios a través de un .. (punto punto) en el parámetro query en una acción writeDataFile en el servlet fileRequestor, ejecutar ficheros arbitrarios a través de un .. • https://www.exploit-db.com/exploits/33807 http://www.exploit-db.com/exploits/33807 http://zerodayinitiative.com/advisories/ZDI-14-161 http://zerodayinitiative.com/advisories/ZDI-14-162 http://zerodayinitiative.com/advisories/ZDI-14-163 http://zerodayinitiative.com/advisories/ZDI-14-165 http://zerodayinitiative.com/advisories/ZDI-14-166 - • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •