An issue was discovered in Aviatrix Controller 6.x before 6.5-1804.1922. Unrestricted upload of a file with a dangerous type is possible, which allows an unauthenticated user to execute arbitrary code via directory traversal.
The product uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize sequences such as ".." that can resolve to a location that is outside of that directory.
Link | Tags |
---|---|
https://docs.aviatrix.com/HowTos/UCC_Release_Notes.html#security-note-9-11-2021 | release notes vendor advisory |
https://wearetradecraft.com/advisories/tc-2021-0002/ | third party advisory exploit |
http://packetstormsecurity.com/files/164461/Aviatrix-Controller-6.x-Path-Traversal-Code-Execution.html | exploit vdb entry third party advisory |