Directory traversal vulnerability in the getEntry method in the PortalModuleInstallManager component in a servlet in nps.jar in the Administration Console (aka Access Management Console) in Novell Access Manager 3.1 before 3.1.2-281 on Windows allows remote attackers to create arbitrary files with any contents, and consequently execute arbitrary code, via a .. (dot dot) in a parameter, aka ZDI-CAN-678.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/59528 | vdb entry |
http://www.securitytracker.com/id?1024132 | vdb entry |
http://secunia.com/advisories/40198 | third party advisory vendor advisory |
http://www.novell.com/support/viewContent.do?externalId=7006255&sliceId=1 | |
http://www.vupen.com/english/advisories/2010/1516 | vdb entry vendor advisory |
http://www.securityfocus.com/bid/40931 | vdb entry |