Polycom RealPresence Resource Manager (aka RPRM) before 8.4 allows remote authenticated users to obtain the installation path via an HTTP POST request to PlcmRmWeb/JConfigManager.
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
http://www.securityfocus.com/archive/1/535852/100/0/threaded | mailing list |
http://packetstormsecurity.com/files/132463/Polycom-RealPresence-Resource-Manager-RPRM-Disclosure-Traversal.html | third party advisory vdb entry exploit |
http://seclists.org/fulldisclosure/2015/Jun/81 | mailing list vdb entry exploit third party advisory |
https://www.exploit-db.com/exploits/37449/ | third party advisory vdb entry exploit |
http://www.securityfocus.com/bid/75432 | third party advisory vdb entry |
https://support.polycom.com/global/documents/support/documentation/Security_Center_Post_for_RPRM_CVEs.pdf | vendor advisory |