Lucene search

K
packetstormHan SahinPACKETSTORM:130920
HistoryMar 20, 2015 - 12:00 a.m.

EMC M&R (Watch4net) MIB Browser Path Traversal

2015-03-2000:00:00
Han Sahin
packetstormsecurity.com
16

0.032 Low

EPSS

Percentile

90.0%

`------------------------------------------------------------------------  
Path traversal vulnerability in EMC M&R (Watch4net) MIB Browser  
------------------------------------------------------------------------  
Han Sahin, November 2014  
  
------------------------------------------------------------------------  
Abstract  
------------------------------------------------------------------------  
A path traversal vulnerability was found in EMC M&R (Watch4net) MIB  
Browser. This vulnerability allows an attacker to access sensitive files  
containing configuration data, passwords, database records, log data,  
source code, and program scripts and binaries.  
  
------------------------------------------------------------------------  
Affected products  
------------------------------------------------------------------------  
EMC reports that the following products are affected by this  
vulnerability:  
  
- EMC M&R (Watch4Net) versions prior 6.5u1  
- EMC ViPR SRM versions prior to 3.6.1  
  
------------------------------------------------------------------------  
See also  
------------------------------------------------------------------------  
- CVE-2015-0516  
- ESA-2015-004: EMC M&R (Watch4Net) Multiple Vulnerabilities  
  
------------------------------------------------------------------------  
Fix  
------------------------------------------------------------------------  
EMC released the following updated versions that resolve this  
vulnerability:  
  
- EMC M&R (Watch4Net) 6.5u1  
- EMC ViPR SRM 3.6.1  
  
Registered customers can download upgraded software from support.emc.com  
at https://support.emc.com/downloads/34247_ViPR-SRM.  
  
------------------------------------------------------------------------  
Details  
------------------------------------------------------------------------  
https://www.securify.nl/advisory/SFY20141105/path_traversal_vulnerability_in_emc_m_r__watch4net__mib_browser.html  
  
  
This vulnerability can be trigger via de name URL parameter of the /mib-browser/mibs/download page. An authenticated attacker can supply path traversal sequences to break out of the intended download directory and read files elsewhere on the file system. This allows the attacker to access sensitive files containing configuration data, passwords, database records, log data, source code, and program scripts and binaries.  
  
The following URLs can be used to demonstrate this issue:  
  
http://<target>:58080/mib-browser/mibs/download?name=..\..\..\..\Web-Servers\Tomcat\Default\conf\server.xml  
http://<target>:58080/mib-browser/mibs/download?name=..\..\..\..\..\..\..\..\..\..\..\..\..\..\..\..\windows\System32\drivers\etc\hosts  
`

0.032 Low

EPSS

Percentile

90.0%