// For flags

CVE-2009-0880

IBM System Director Agent 5.20 - CIM Server Privilege Escalation

Severity Score

6.8
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

4
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Directory traversal vulnerability in the CIM server in IBM Director before 5.20.3 Service Update 2 on Windows allows remote attackers to load and execute arbitrary local DLL code via a .. (dot dot) in a /CIMListener/ URI in an M-POST request.

Vulnerabilidad de salto de directorio en el servidor CIM en IBM Director anteriores v5.20.3 Service Update 2 en Windows que permite a los atacantes remotos cargar y ejecutar arbitrariamente código DLL local a través .. (punto punto) en un /CIMListener/ URI en una petición M-POST.

By sending a specially crafted request to a vulnerable IBM System Director sever, an attacker can force it to load a DLL remotely from a WebDAV share. Versions 5.20.3 and below are vulnerable.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2009-03-10 First Exploit
  • 2009-03-12 CVE Reserved
  • 2009-03-12 CVE Published
  • 2024-08-07 CVE Updated
  • 2024-09-20 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Ibm
Search vendor "Ibm"
Director
Search vendor "Ibm" for product "Director"
<= 5.20.3
Search vendor "Ibm" for product "Director" and version " <= 5.20.3"
service_update_1
Affected
in Microsoft
Search vendor "Microsoft"
Windows
Search vendor "Microsoft" for product "Windows"
*-
Safe
Ibm
Search vendor "Ibm"
Director
Search vendor "Ibm" for product "Director"
3.1.1
Search vendor "Ibm" for product "Director" and version "3.1.1"
-
Affected
in Microsoft
Search vendor "Microsoft"
Windows
Search vendor "Microsoft" for product "Windows"
*-
Safe
Ibm
Search vendor "Ibm"
Director
Search vendor "Ibm" for product "Director"
4.10
Search vendor "Ibm" for product "Director" and version "4.10"
-
Affected
in Microsoft
Search vendor "Microsoft"
Windows
Search vendor "Microsoft" for product "Windows"
*-
Safe
Ibm
Search vendor "Ibm"
Director
Search vendor "Ibm" for product "Director"
4.11
Search vendor "Ibm" for product "Director" and version "4.11"
-
Affected
in Microsoft
Search vendor "Microsoft"
Windows
Search vendor "Microsoft" for product "Windows"
*-
Safe
Ibm
Search vendor "Ibm"
Director
Search vendor "Ibm" for product "Director"
4.12
Search vendor "Ibm" for product "Director" and version "4.12"
-
Affected
in Microsoft
Search vendor "Microsoft"
Windows
Search vendor "Microsoft" for product "Windows"
*-
Safe
Ibm
Search vendor "Ibm"
Director
Search vendor "Ibm" for product "Director"
4.20
Search vendor "Ibm" for product "Director" and version "4.20"
-
Affected
in Microsoft
Search vendor "Microsoft"
Windows
Search vendor "Microsoft" for product "Windows"
*-
Safe
Ibm
Search vendor "Ibm"
Director
Search vendor "Ibm" for product "Director"
4.21
Search vendor "Ibm" for product "Director" and version "4.21"
-
Affected
in Microsoft
Search vendor "Microsoft"
Windows
Search vendor "Microsoft" for product "Windows"
*-
Safe
Ibm
Search vendor "Ibm"
Director
Search vendor "Ibm" for product "Director"
4.22
Search vendor "Ibm" for product "Director" and version "4.22"
-
Affected
in Microsoft
Search vendor "Microsoft"
Windows
Search vendor "Microsoft" for product "Windows"
*-
Safe
Ibm
Search vendor "Ibm"
Director
Search vendor "Ibm" for product "Director"
5.10.0
Search vendor "Ibm" for product "Director" and version "5.10.0"
-
Affected
in Microsoft
Search vendor "Microsoft"
Windows
Search vendor "Microsoft" for product "Windows"
*-
Safe
Ibm
Search vendor "Ibm"
Director
Search vendor "Ibm" for product "Director"
5.10.1
Search vendor "Ibm" for product "Director" and version "5.10.1"
-
Affected
in Microsoft
Search vendor "Microsoft"
Windows
Search vendor "Microsoft" for product "Windows"
*-
Safe
Ibm
Search vendor "Ibm"
Director
Search vendor "Ibm" for product "Director"
5.10.2
Search vendor "Ibm" for product "Director" and version "5.10.2"
-
Affected
in Microsoft
Search vendor "Microsoft"
Windows
Search vendor "Microsoft" for product "Windows"
*-
Safe
Ibm
Search vendor "Ibm"
Director
Search vendor "Ibm" for product "Director"
5.10.3
Search vendor "Ibm" for product "Director" and version "5.10.3"
-
Affected
in Microsoft
Search vendor "Microsoft"
Windows
Search vendor "Microsoft" for product "Windows"
*-
Safe
Ibm
Search vendor "Ibm"
Director
Search vendor "Ibm" for product "Director"
5.20.0
Search vendor "Ibm" for product "Director" and version "5.20.0"
-
Affected
in Microsoft
Search vendor "Microsoft"
Windows
Search vendor "Microsoft" for product "Windows"
*-
Safe
Ibm
Search vendor "Ibm"
Director
Search vendor "Ibm" for product "Director"
5.20.1
Search vendor "Ibm" for product "Director" and version "5.20.1"
-
Affected
in Microsoft
Search vendor "Microsoft"
Windows
Search vendor "Microsoft" for product "Windows"
*-
Safe
Ibm
Search vendor "Ibm"
Director
Search vendor "Ibm" for product "Director"
5.20.2
Search vendor "Ibm" for product "Director" and version "5.20.2"
-
Affected
in Microsoft
Search vendor "Microsoft"
Windows
Search vendor "Microsoft" for product "Windows"
*-
Safe