This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Netgain Enterprise Manager. Authentication is not required to exploit this vulnerability. The specific flaw exists within upload_save_do.jsp. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code under the context of the current user. Was ZDI-CAN-4751.
References
Link | Resource |
---|---|
https://www.tenable.com/security/research/tra-2018-02 | Third Party Advisory |
https://zerodayinitiative.com/advisories/ZDI-17-952 | Third Party Advisory VDB Entry |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: zdi
Published: 2018-01-23T01:00:00
Updated: 2018-01-31T10:57:01
Reserved: 2017-11-06T00:00:00
Link: CVE-2017-16610
JSON object: View
NVD Information
Status : Modified
Published: 2018-01-23T01:29:01.380
Modified: 2019-10-09T23:25:11.567
Link: CVE-2017-16610
JSON object: View
Redhat Information
No data.