Directory traversal vulnerability in the CIM server in IBM Director before 5.20.3 Service Update 2 on Windows allows remote attackers to load and execute arbitrary local DLL code via a .. (dot dot) in a /CIMListener/ URI in an M-POST request.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
http://www.vupen.com/english/advisories/2009/0656 | patch vendor advisory vdb entry |
http://osvdb.org/52616 | vdb entry |
http://www.securityfocus.com/archive/1/501639/100/0/threaded | mailing list |
http://www.securityfocus.com/bid/34065 | vdb entry |
https://www.sec-consult.com/files/20090305-2_IBM_director_privilege_escalation.txt | exploit |
http://secunia.com/advisories/34212 | third party advisory vendor advisory |
https://www14.software.ibm.com/webapp/iwm/web/reg/download.do?source=dmp&S_PKG=director_x_520&S_TACT=sms&lang=en_US&cp=UTF-8 | patch vendor advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/49286 | vdb entry |