Directory traversal vulnerability in Oracle Reports allows remote attackers to read arbitrary files via an absolute or relative path to the (1) CUSTOMIZE or (2) desformat parameters to rwservlet. NOTE: vector 2 is probably the same as CVE-2006-0289, and fixed in Jan 2006 CPU.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
http://securitytracker.com/id?1014527 | vdb entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/24321 | vdb entry |
http://www.securityfocus.com/archive/1/422256/30/7430/threaded | mailing list |
http://securitytracker.com/id?1014525 | vdb entry |
http://marc.info/?l=bugtraq&m=112181242916757&w=2 | mailing list |
http://www.red-database-security.com/advisory/oracle_reports_read_any_file.html | exploit vendor advisory |
http://secunia.com/advisories/18493 | third party advisory vendor advisory |
http://www.vupen.com/english/advisories/2006/0323 | vdb entry vendor advisory |
http://marc.info/?l=bugtraq&m=112181054226520&w=2 | mailing list |
http://secunia.com/advisories/18608 | third party advisory vendor advisory |
http://www.red-database-security.com/advisory/oracle_reports_read_any_xml_file.html | exploit vendor advisory |