Directory traversal vulnerability in LayerLoader.jsp in the theme component in IBM WebSphere Portal 7.0.0.1 and 7.0.0.2 before CF19 and 8.0 before CF03 allows remote attackers to read arbitrary files via a crafted URI.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
http://secunia.com/advisories/51281 | third party advisory |
http://www.ibm.com/support/docview.wss?uid=swg24033155 | third party advisory patch |
https://exchange.xforce.ibmcloud.com/vulnerabilities/78914 | vdb entry third party advisory |
http://www.ibm.com/connections/blogs/PSIRT/entry/security_vulnerability_in_theme_component_for_websphere_portal_versions_7_0_0_x_and_8_0_cve2012_48344 | patch vendor advisory |
http://www.ibm.com/support/docview.wss?uid=swg21617713 | patch vendor advisory |
http://www-01.ibm.com/support/docview.wss?uid=swg1PM76354 | vendor advisory |