Directory traversal vulnerability in novelllogmanager/FileDownload in Novell Sentinel Log Manager 1.2.0.1_938 and earlier, as used in Novell Sentinel before 7.0.1.0, allows remote authenticated users to read arbitrary files via a .. (dot dot) in the filename parameter.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
http://www.securitytracker.com/id?1026437 | vdb entry |
http://secunia.com/advisories/47258 | third party advisory vendor advisory |
http://osvdb.org/77948 | vdb entry |
http://archives.neohapsis.com/archives/fulldisclosure/2011-12/0368.html | mailing list |
https://exchange.xforce.ibmcloud.com/vulnerabilities/71861 | vdb entry |
http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5138757.html | |
http://secunia.com/advisories/48760 | third party advisory |