CVE-2011-4722 – Ipswitch TFTP Server 1.0.0.24 - Directory Traversal
https://notcve.org/view.php?id=CVE-2011-4722
Directory traversal vulnerability in the TFTP Server 1.0.0.24 in Ipswitch WhatsUp Gold allows remote attackers to read arbitrary files via a .. (dot dot) in the Filename field of an RRQ operation. Vulnerailidad de salto en disco en TFTP Server 1.0.0.24 en Ipswitch WhatsUp Gold permite a atacantes remotos leer ficheros arbitrarios a través de .. (punto punto) en el campo Filename de una operación RRQ • https://www.exploit-db.com/exploits/18189 http://secpod.org/blog/?p=424 http://secunia.com/advisories/47025 http://securitytracker.com/id?1026368 http://www.exploit-db.com/exploits/18189 http://www.osvdb.org/77455 https://exchange.xforce.ibmcloud.com/vulnerabilities/71610 https://h20565.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c05054714 http://secpod.org/advisories/SecPod_Ipswitch_TFTP_Server_Dir_Trav.txt • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •