2 results (0.001 seconds)

CVSS: 5.0EPSS: 94%CPEs: 1EXPL: 0

The FileUploadController servlet in EMC Connectrix Manager Converged Network Edition (CMCNE) before 12.1.5 does not properly restrict additions to the Connectrix Manager repository, which allows remote attackers to obtain sensitive information by importing a crafted firmware file. El servlet FileUploadController en EMC Connectrix Manager Converged Network Edition (CMCNE) anterior a 12.1.5 no restringe debidamente adiciones al repositorio Connectrix Manager, lo que permite a atacantes remotos obtener información sensible mediante la importación de un archivo de firmware manipulado. This vulnerability allows remote attackers to read arbitrary files on vulnerable installations of EMC Connectrix Manager Converged Network Edition. Authentication is not required to exploit this vulnerability. The specific flaw exists within the FileUploadController servlet which is part of inmservlets. This vulnerability allows an unauthenticated user to read an arbitrary file on the system. • http://archives.neohapsis.com/archives/bugtraq/2014-03/0115.html http://secunia.com/advisories/57513 http://www.securityfocus.com/bid/66308 http://www.securitytracker.com/id/1029939 https://exchange.xforce.ibmcloud.com/vulnerabilities/91987 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 10.0EPSS: 93%CPEs: 3EXPL: 2

The server in Brocade Network Advisor before 12.1.0, as used in EMC Connectrix Manager Converged Network Edition (CMCNE), HP B-series SAN Network Advisor, and possibly other products, allows remote attackers to execute arbitrary code by using a servlet to upload an executable file. El servidor en EMC Connectrix Manager Converged Network Edition (CMCNE) 11.2.1, 12.0.1, y 12.0.3 permite a atacantes remotos ejecutar código arbitrario mediante el uso de un servlet para subir un archivo ejecutable. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of EMC Connectrix Manager Converged Network Edition. Authentication is not required to exploit this vulnerability. The specific flaw exists within the 'SoftwareFileUploadMoreInfoServlet', which allows an unauthenticated user to copy any file to an arbitrary location on the server. When combined with information disclosure vulnerabilities, an attacker can leverage this directory traversal vulnerability into arbitrary code execution on the compromised server in the security context of the Administrator account. • https://www.exploit-db.com/exploits/42702 https://www.exploit-db.com/exploits/42701 http://archives.neohapsis.com/archives/bugtraq/2013-12/0053.html http://marc.info/?l=bugtraq&m=138723620521347&w=2 http://secunia.com/advisories/56143 http://www.attrition.org/pipermail/vim/2014-January/002755.html http://www.securitytracker.com/id/1029485 http://www.zerodayinitiative.com/advisories/ZDI-13-283 https://exchange.xforce.ibmcloud.com/vulnerabilities/90728 • CWE-94: Improper Control of Generation of Code ('Code Injection') •