4 results (0.008 seconds)

CVSS: 6.5EPSS: 6%CPEs: 1EXPL: 1

Micro Focus Novell Service Desk before 7.2 allows remote authenticated users to read arbitrary attachments via a request to a LiveTime.woa URL, as demonstrated by obtaining sensitive information via a (1) downloadLogFiles or (2) downloadFile action. Micro Focus Novell Service Desk en versiones anteriores a 7.2 permite a usuarios autenticados remotos leer archivos adjuntos arbitrarios a través de una petición a una URL LiveTime.woa, según lo demostrado obteniendo información sensible a través de una acción (1) downloadLogFiles o (2) downloadFile. Novell Service Desk versions 7.1.0 and below suffer from code execution, information disclosure, cross site scripting, remote file upload, HQL injection, and traversal vulnerabilities. • https://www.exploit-db.com/exploits/39687 http://www.securityfocus.com/archive/1/538043/100/0/threaded https://packetstormsecurity.com/files/136646 https://raw.githubusercontent.com/pedrib/PoC/master/advisories/novell-service-desk-7.1.0.txt https://www.novell.com/support/kb/doc.php?id=7017429 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 1

LiveTime/WebObjects/LiveTime.woa/wa/DownloadAction/downloadFile in Micro Focus Novell Service Desk before 7.2 allows remote authenticated users to conduct Hibernate Query Language (HQL) injection attacks and obtain sensitive information via the entityName parameter. LiveTime/WebObjects/LiveTime.woa/wa/DownloadAction/downloadFile en Micro Focus Novell Service Desk en versiones anteriores a 7.2 permite a usuarios autenticados remotos llevar a cabo ataques de inyección Hibernate Query Language (HQL) y obtener información sensible a través del parámetro entityName. Novell Service Desk versions 7.1.0 and below suffer from code execution, information disclosure, cross site scripting, remote file upload, HQL injection, and traversal vulnerabilities. • https://www.exploit-db.com/exploits/39687 http://www.securityfocus.com/archive/1/538043/100/0/threaded https://packetstormsecurity.com/files/136646 https://raw.githubusercontent.com/pedrib/PoC/master/advisories/novell-service-desk-7.1.0.txt https://www.novell.com/support/kb/doc.php?id=7017430 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 5.4EPSS: 1%CPEs: 1EXPL: 1

Multiple cross-site scripting (XSS) vulnerabilities in Micro Focus Novell Service Desk before 7.2 allow remote authenticated users to inject arbitrary web script or HTML via a certain (1) user name, (2) tf_aClientFirstName, (3) tf_aClientLastName, (4) ta_selectedTopicContent, (5) tf_orgUnitName, (6) tf_aManufacturerFullName, (7) tf_aManufacturerName, (8) tf_aManufacturerAddress, or (9) tf_aManufacturerCity parameter. Múltiples vulnerabiliaddes de XSS en Micro Focus Novell Service Desk en versiones anteriores a 7.2 permiten a usuarios autenticados remotos inyectar secuencias de comandos web o HTML arbitrarios a través de un determinado parámetro (1) user name, (2) tf_aClientFirstName, (3) tf_aClientLastName, (4) ta_selectedTopicContent, (5) tf_orgUnitName, (6) tf_aManufacturerFullName, (7) tf_aManufacturerName, (8) tf_aManufacturerAddress o (9) tf_aManufacturerCity. Novell Service Desk versions 7.1.0 and below suffer from code execution, information disclosure, cross site scripting, remote file upload, HQL injection, and traversal vulnerabilities. • https://www.exploit-db.com/exploits/39687 http://www.securityfocus.com/archive/1/538043/100/0/threaded https://packetstormsecurity.com/files/136646 https://raw.githubusercontent.com/pedrib/PoC/master/advisories/novell-service-desk-7.1.0.txt https://www.novell.com/support/kb/doc.php?id=7017431 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 7.2EPSS: 83%CPEs: 1EXPL: 2

Directory traversal vulnerability in the import users feature in Micro Focus Novell Service Desk before 7.2 allows remote authenticated administrators to upload and execute arbitrary JSP files via a .. (dot dot) in a filename within a multipart/form-data POST request to a LiveTime.woa URL. Vulnerabilidad de salto de directorio en la característica importar usuarios en Micro Focus Novell Service Desk en versiones anteriores a 7.2 permite a administradores autenticados remotos cargar y ejecutar archivos JSP arbitrarios a través de un .. (punto punto) en un nombre de archivo dentro de una petición multipart/form-data POST a una URL LiveTime.woa. Novell Service Desk versions 7.1.0 and below suffer from code execution, information disclosure, cross site scripting, remote file upload, HQL injection, and traversal vulnerabilities. • https://www.exploit-db.com/exploits/39687 https://www.exploit-db.com/exploits/39708 http://packetstormsecurity.com/files/136717/Novell-ServiceDesk-Authenticated-File-Upload.html http://www.rapid7.com/db/modules/exploit/multi/http/novell_servicedesk_rce http://www.securityfocus.com/archive/1/538043/100/0/threaded https://packetstormsecurity.com/files/136646 https://raw.githubusercontent.com/pedrib/PoC/master/advisories/novell-service-desk-7.1.0.txt https://www.novell.com/support/kb/doc.php&# • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •