1 results (0.001 seconds)

CVSS: 10.0EPSS: 4%CPEs: 1EXPL: 0

Directory traversal vulnerability in aws_tmxn.exe in the Admin Agent service in the server in EMC Documentum ApplicationXtender Workflow, possibly 5.40 SP1 and earlier, allows remote attackers to upload arbitrary files, and execute arbitrary code, via directory traversal sequences in requests to TCP port 2606. Vulnerabilidad de salto de directorio en aws_tmxn.exe en el servicio Admin Agent en el servidor en EMC Documentum ApplicationXtender Workflow, posiblemente v5.40 SP1 y anteriores, permite a atacantes remotos subir ficheros arbitrarios y ejecutar código de forma arbitraria a través de secuencias de salto de directorio en peticiones al puerto TCP 2606. This vulnerability allows remote attackers to execute arbitrary code on systems with vulnerable installations of EMC ApplicationXtender Workflow Server. Authentication is not required to exploit this vulnerability. The specific flaw exists in the Admin Agent service (aws_tmxn.exe) which listens by default on TCP port 2606. The process exposes functionality to upload arbitrary files to the remote system. • http://secunia.com/advisories/37070 http://www.zerodayinitiative.com/advisories/ZDI-08-095 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •