1 results (0.005 seconds)

CVSS: 7.8EPSS: 10%CPEs: 1EXPL: 0

Directory Traversal in Dell Storage Manager 2016 R2.1 causes Information Disclosure when the doGet method of the EmWebsiteServlet class doesn't properly validate user provided path before using it in file operations. Was ZDI-CAN-4459. Una vulnerabilidad de salto de directorio en Dell Storage Manager 2016 R2.1 da lugar a una divulgación de información cuando el método doGet de la clase EmWebsiteServlet no valida correctamente la ruta ofrecida por el usuario y la utiliza en operaciones de archivos. This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Dell Storage Manager. Authentication is not required to exploit this vulnerability. The specific flaw exists within the doGet method of the EmWebsiteServlet class, which listens on TCP port 3033 by default. • http://topics-cdn.dell.com/pdf/dell-compellent-sc8000_release%20notes24_en-us.pdf http://www.securityfocus.com/bid/100138 http://www.zerodayinitiative.com/advisories/ZDI-17-523 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •