A Directory Traversal vulnerability in FileReceiveServlet in the Brocade Network Advisor versions released prior to and including 14.0.2 could allow remote attackers to upload a malicious file in a section of the file system where it can be executed.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/95695 | third party advisory vdb entry |
http://www.zerodayinitiative.com/advisories/ZDI-17-049 | third party advisory vdb entry |
https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2017-177 | vendor advisory |
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03785en_us | third party advisory |