// For flags

CVE-2014-3914

Rocket Servergraph Admin Center for TSM userRequest save_server_groups Command Remote Code Execution Vulnerability

Severity Score

10.0
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

2
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Directory traversal vulnerability in the Admin Center for Tivoli Storage Manager (TSM) in Rocket ServerGraph 1.2 allows remote attackers to (1) create arbitrary files via a .. (dot dot) in the query parameter in a writeDataFile action to the fileRequestor servlet, execute arbitrary files via a .. (dot dot) in the query parameter in a (2) run or (3) runClear action to the fileRequestor servlet, (4) read arbitrary files via a readDataFile action to the fileRequestor servlet, (5) execute arbitrary code via a save_server_groups action to the userRequest servlet, or (6) delete arbitrary files via a del action in the fileRequestServlet servlet.

Vulnerabilidad de salto de directorio en el centro de administración para Tivoli Storage Manager (TSM) en Rocket ServerGraph 1.2 permite a atacantes remotos (1) crear ficheros arbitrarios a través de un .. (punto punto) en el parámetro query en una acción writeDataFile en el servlet fileRequestor, ejecutar ficheros arbitrarios a través de un .. (punto punto) en el parámetro query en una acción (2) run o (3) runClear en el servlet fileRequestor, (4) leer ficheros arbitrarios a través de una acción readDataFile en el servlet fileRequestor, (5) ejecutar código arbitrario a través de una acción save_server_groups en el servlet userRequest o (6) eliminar ficheros arbitrarios a través de una acción del en el servlet fileRequestServlet.

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Rocket Servergraph Admin Center for Tivoli Storage Manager. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the userRequest servlet. This servlet is vulnerable to a directory traversal vulnerability when processing save_server_groups commands. A remote attacker can leverage this vulnerability to execute remote code under the context of the SYSTEM user.

*Credits: Andrea Micalizzi (rgod)
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2014-05-29 CVE Reserved
  • 2014-06-02 CVE Published
  • 2014-06-18 First Exploit
  • 2024-08-06 CVE Updated
  • 2024-11-10 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Rocketsoftware
Search vendor "Rocketsoftware"
Rocket Servergraph
Search vendor "Rocketsoftware" for product "Rocket Servergraph"
1.2
Search vendor "Rocketsoftware" for product "Rocket Servergraph" and version "1.2"
-
Affected