An authenticated, read-only user can upload a file and perform a directory traversal to have the uploaded file placed in a location of their choosing. This can be used to overwrite existing PERL modules within the application to achieve remote code execution (RCE) by an attacker.
The product uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize "../" sequences that can resolve to a location that is outside of that directory.
Link | Tags |
---|---|
https://korelogic.com/Resources/Advisories/KL-001-2025-016.txt | third party advisory |
https://lpar2rrd.com/note800.php | release notes |