CVE-2014-3914
Rocket Servergraph Admin Center for TSM userRequest save_server_groups Command Remote Code Execution Vulnerability
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
2Exploited in Wild
-Decision
Descriptions
Directory traversal vulnerability in the Admin Center for Tivoli Storage Manager (TSM) in Rocket ServerGraph 1.2 allows remote attackers to (1) create arbitrary files via a .. (dot dot) in the query parameter in a writeDataFile action to the fileRequestor servlet, execute arbitrary files via a .. (dot dot) in the query parameter in a (2) run or (3) runClear action to the fileRequestor servlet, (4) read arbitrary files via a readDataFile action to the fileRequestor servlet, (5) execute arbitrary code via a save_server_groups action to the userRequest servlet, or (6) delete arbitrary files via a del action in the fileRequestServlet servlet.
Vulnerabilidad de salto de directorio en el centro de administración para Tivoli Storage Manager (TSM) en Rocket ServerGraph 1.2 permite a atacantes remotos (1) crear ficheros arbitrarios a través de un .. (punto punto) en el parámetro query en una acción writeDataFile en el servlet fileRequestor, ejecutar ficheros arbitrarios a través de un .. (punto punto) en el parámetro query en una acción (2) run o (3) runClear en el servlet fileRequestor, (4) leer ficheros arbitrarios a través de una acción readDataFile en el servlet fileRequestor, (5) ejecutar código arbitrario a través de una acción save_server_groups en el servlet userRequest o (6) eliminar ficheros arbitrarios a través de una acción del en el servlet fileRequestServlet.
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Rocket Servergraph Admin Center for Tivoli Storage Manager. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the userRequest servlet. This servlet is vulnerable to a directory traversal vulnerability when processing save_server_groups commands. A remote attacker can leverage this vulnerability to execute remote code under the context of the SYSTEM user.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2014-05-29 CVE Reserved
- 2014-06-02 CVE Published
- 2014-06-18 First Exploit
- 2024-08-06 CVE Updated
- 2024-11-10 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CAPEC
References (8)
URL | Tag | Source |
---|---|---|
http://zerodayinitiative.com/advisories/ZDI-14-161 | X_refsource_misc | |
http://zerodayinitiative.com/advisories/ZDI-14-162 | X_refsource_misc | |
http://zerodayinitiative.com/advisories/ZDI-14-163 | X_refsource_misc | |
http://zerodayinitiative.com/advisories/ZDI-14-165 | X_refsource_misc | |
http://zerodayinitiative.com/advisories/ZDI-14-166 | X_refsource_misc | |
- |
URL | Date | SRC |
---|---|---|
https://www.exploit-db.com/exploits/33807 | 2014-06-18 | |
http://www.exploit-db.com/exploits/33807 | 2024-08-06 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Rocketsoftware Search vendor "Rocketsoftware" | Rocket Servergraph Search vendor "Rocketsoftware" for product "Rocket Servergraph" | 1.2 Search vendor "Rocketsoftware" for product "Rocket Servergraph" and version "1.2" | - |
Affected
|