Directory traversal vulnerability in WebSEAL in IBM Tivoli Access Manager for e-business 6.1.1 before 6.1.1-TIV-AWS-FP0001 on AIX allows remote attackers to read arbitrary files via a %uff0e%uff0e (encoded dot dot) in a URI.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
http://www.vupen.com/english/advisories/2010/3329 | vdb entry vendor advisory |
http://www.securityfocus.com/bid/45582 | vdb entry exploit |
http://www-01.ibm.com/support/docview.wss?uid=swg24028829 | |
http://securitytracker.com/id?1024927 | vdb entry |
http://www.osvdb.org/70158 | vdb entry |
http://secunia.com/advisories/42727 | third party advisory vendor advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/64306 | vdb entry |