CVE-2017-16609
NetGain Enterprise Manager download Arbitrary File Download Vulnerability
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Netgain Enterprise Manager. Authentication is not required to exploit this vulnerability. The specific flaw exists within download.jsp. The issue results from the lack of proper validation of a user-supplied string before using it to download a file. An attacker can leverage this vulnerability to expose sensitive information. Was ZDI-CAN-4750.
Esta vulnerabilidad permite que atacantes remotos revelen información sensible en instalaciones vulnerables de Netgain Enterprise Manager. No se requiere autenticación para explotar esta vulnerabilidad. Este error en concreto existe en download.jsp. El problema deriva de la falta de validación correcta de una cadena proporcionada por el usuario antes de emplearla para descargar un archivo. Un atacante puede aprovechar esta vulnerabilidad para exponer información sensible. Anteriormente era ZDI-CAN-4750.
This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Netgain Enterprise Manager. Authentication is not required to exploit this vulnerability.
The specific flaw exists within download.jsp. The issue results from the lack of proper validation of a user-supplied string before using it to download a file. An attacker can leverage this vulnerability to expose sensitive information.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2017-11-06 CVE Reserved
- 2017-12-13 CVE Published
- 2024-01-02 EPSS Updated
- 2024-08-05 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-39: Path Traversal: 'C:dirname'
- CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CAPEC
References (2)
URL | Tag | Source |
---|---|---|
https://www.tenable.com/security/research/tra-2018-02 | Third Party Advisory | |
https://zerodayinitiative.com/advisories/ZDI-17-951 | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Netgain-systems Search vendor "Netgain-systems" | Enterprise Manager Search vendor "Netgain-systems" for product "Enterprise Manager" | < 7.2.766 Search vendor "Netgain-systems" for product "Enterprise Manager" and version " < 7.2.766" | - |
Affected
|