CVE-2009-1523 : Détail

CVE-2009-1523

Directory Traversal
A01-Broken Access Control
27.95%V4
Network
2009-05-05
15h00 +00:00
2009-06-06
07h00 +00:00
Notifications pour un CVE
Restez informé de toutes modifications pour un CVE spécifique.
Gestion des notifications

Descriptions du CVE

Directory traversal vulnerability in the HTTP server in Mort Bay Jetty 5.1.14, 6.x before 6.1.17, and 7.x through 7.0.0.M2 allows remote attackers to access arbitrary files via directory traversal sequences in the URI.

Informations du CVE

Faiblesses connexes

CWE-ID Nom de la faiblesse Source
CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.

Métriques

Métriques Score Gravité CVSS Vecteur Source
V2 5 AV:N/AC:L/Au:N/C:P/I:N/A:N nvd@nist.gov

EPSS

EPSS est un modèle de notation qui prédit la probabilité qu'une vulnérabilité soit exploitée.

Score EPSS

Le modèle EPSS produit un score de probabilité compris entre 0 et 1 (0 et 100 %). Plus la note est élevée, plus la probabilité qu'une vulnérabilité soit exploitée est grande.

Percentile EPSS

Le percentile est utilisé pour classer les CVE en fonction de leur score EPSS. Par exemple, une CVE dans le 95e percentile selon son score EPSS est plus susceptible d'être exploitée que 95 % des autres CVE. Ainsi, le percentile sert à comparer le score EPSS d'une CVE par rapport à d'autres CVE.

Informations sur l'Exploit

Exploit Database EDB-ID : 36318

Date de publication : 2011-11-17 23h00 +00:00
Auteur : Alexey Sintsov
EDB Vérifié : Yes

source: https://www.securityfocus.com/bid/50723/info Jetty Web Server is prone to a directory-traversal vulnerability because it fails to sufficiently sanitize user-supplied input. Exploiting this issue will allow an attacker to view arbitrary files within the context of the webserver. Information harvested may aid in launching further attacks. http://www.example.com:9084/vci/downloads/.\..\..\..\..\..\..\..\Documents and Settings\All Users\Application Data\VMware\VMware VirtualCenter\SSL\rui.key
Exploit Database EDB-ID : 18138

Date de publication : 2011-11-20 23h00 +00:00
Auteur : Alexey Sintsov
EDB Vérifié : No

# Exploit Title:VMware Update Manager Directory Traversal # Date:18/11/2011 # Author: Alexey Sintsov # Software Link: http://www.vmware.com/ # Version:2.0.2 # Tested on: Windows 2003 / vCenter Update Manager 4.1 U1 # CVE : CVE-2011-4404 DSECRG-11-042 VMware Update Manager - Directory Traversal Application: VMware Update Manager Versions Affected: vCenter Update Manager 4.1 prior to Update 2, vCenter Update Manager 4.0 prior to Update 4 Vendor URL: http://vmware.com Bugs: Directory Traversal File Read CVE: CVE-2011-4404 CVSS2: 7.8 Exploits: YES Reported: 06.06.2010 Vendor response: 06.06.2010 Date of Public Advisory: 18.11.2011 Authors: Alexey Sintsov Digital Security Research Group [DSecRG] (research [at] dsecrg [dot]com) Description ******** Directory Traversal vulnerability was found in Jetty web server that is used by VMware Update manager. Details ******* Directory Traversal vulnerability was found in Jetty web server that is used by VUM. With this vulnerability, an non-authenticated attacker can read any file on the server (with rights of the process). Sample ****** http://<target>:9084/vci/downloads/.\..\..\..\..\..\..\..\Documents and Settings\All Users\Application Data\VMware\VMware VirtualCenter\SSL\rui.key References ********** http://dsecrg.com/pages/vul/show.php?id=342 http://www.vmware.com/security/advisories/VMSA-2011-0014.html Fix Information ************* Vendor make fix for this issue: Fixed in Update Manager 5.0 Windows not affected Fixed in Update Manager 4.1 Windows Update 2 Fixed in Update Manager 4.0 Windows Update 4 About DSecRG ******* The main mission of DSecRG is to conduct researches of business critical systems such as ERP, CRM, SRM, BI, SCADA, banking software and others. The result of this work is then integrates in ERPScan Security Scanner. Being on the top edge of ERP and SAP security DSecRG research helps to improve a quality of ERPScan consulting services and protects you from the latest threads. Contact: research [at] dsecrg [dot] com http://www.dsecrg.com About ERPScan ******* ERPScan is an innovative company engaged in the research of ERP security and develops products for ERP system security assessment. Apart from this the company renders consulting services for secure configuration, development and implementation of ERP systems, and conducts comprehensive assessments and penetration testing of custom solutions. Our flagship products are "ERPScan Security Scanner for SAP" and service "ERPScan Online" which can help customers to perform automated security assessments and compliance checks for SAP solutions. Contact: info [at] erpscan [dot] com http://www.erpscan.com

Products Mentioned

Configuraton 0

Mortbay>>Jetty >> Version To (including) 6.1.16

Mortbay>>Jetty >> Version To (including) 7.0.0

Mortbay>>Jetty >> Version 1.0

Mortbay>>Jetty >> Version 1.0.1

Mortbay>>Jetty >> Version 1.1

Mortbay>>Jetty >> Version 1.1.1

Mortbay>>Jetty >> Version 1.2.0

Mortbay>>Jetty >> Version 1.3.0

Mortbay>>Jetty >> Version 1.3.1

Mortbay>>Jetty >> Version 1.3.2

Mortbay>>Jetty >> Version 1.3.3

Mortbay>>Jetty >> Version 1.3.4

Mortbay>>Jetty >> Version 1.3.5

Mortbay>>Jetty >> Version 2.0

Mortbay>>Jetty >> Version 2.0

Mortbay>>Jetty >> Version 2.0

Mortbay>>Jetty >> Version 2.0

Mortbay>>Jetty >> Version 2.0.0

Mortbay>>Jetty >> Version 2.0.1

Mortbay>>Jetty >> Version 2.0.2

Mortbay>>Jetty >> Version 2.0.3

Mortbay>>Jetty >> Version 2.0.4

Mortbay>>Jetty >> Version 2.0.5

Mortbay>>Jetty >> Version 2.1.0

Mortbay>>Jetty >> Version 2.1.1

Mortbay>>Jetty >> Version 2.1.2

Mortbay>>Jetty >> Version 2.1.3

Mortbay>>Jetty >> Version 2.1.4

Mortbay>>Jetty >> Version 2.1.5

Mortbay>>Jetty >> Version 2.1.6

Mortbay>>Jetty >> Version 2.1.7

Mortbay>>Jetty >> Version 2.1.b0

Mortbay>>Jetty >> Version 2.1.b1

Mortbay>>Jetty >> Version 2.2

Mortbay>>Jetty >> Version 2.2

Mortbay>>Jetty >> Version 2.2

Mortbay>>Jetty >> Version 2.2

Mortbay>>Jetty >> Version 2.2

Mortbay>>Jetty >> Version 2.2

Mortbay>>Jetty >> Version 2.2

Mortbay>>Jetty >> Version 2.2.0

Mortbay>>Jetty >> Version 2.2.1

Mortbay>>Jetty >> Version 2.2.2

Mortbay>>Jetty >> Version 2.2.3

Mortbay>>Jetty >> Version 2.2.4

Mortbay>>Jetty >> Version 2.2.5

Mortbay>>Jetty >> Version 2.2.6

Mortbay>>Jetty >> Version 2.2.7

Mortbay>>Jetty >> Version 2.2.8

Mortbay>>Jetty >> Version 2.3.0

Mortbay>>Jetty >> Version 2.3.0a

Mortbay>>Jetty >> Version 2.3.1

Mortbay>>Jetty >> Version 2.3.2

Mortbay>>Jetty >> Version 2.3.3

Mortbay>>Jetty >> Version 2.3.4

Mortbay>>Jetty >> Version 2.3.5

Mortbay>>Jetty >> Version 2.4.0

Mortbay>>Jetty >> Version 2.4.1

Mortbay>>Jetty >> Version 2.4.2

Mortbay>>Jetty >> Version 2.4.3

Mortbay>>Jetty >> Version 2.4.4

Mortbay>>Jetty >> Version 2.4.5

Mortbay>>Jetty >> Version 2.4.6

Mortbay>>Jetty >> Version 2.4.7

Mortbay>>Jetty >> Version 2.4.8

Mortbay>>Jetty >> Version 2.4.9

Mortbay>>Jetty >> Version 3.0.0

Mortbay>>Jetty >> Version 3.0.0

Mortbay>>Jetty >> Version 3.0.0

Mortbay>>Jetty >> Version 3.0.0

Mortbay>>Jetty >> Version 3.0.0

Mortbay>>Jetty >> Version 3.0.0

Mortbay>>Jetty >> Version 3.0.0

Mortbay>>Jetty >> Version 3.0.0

Mortbay>>Jetty >> Version 3.0.0

Mortbay>>Jetty >> Version 3.0.1

Mortbay>>Jetty >> Version 3.0.2

Mortbay>>Jetty >> Version 3.0.3

Mortbay>>Jetty >> Version 3.0.4

Mortbay>>Jetty >> Version 3.0.5

Mortbay>>Jetty >> Version 3.0.6

Mortbay>>Jetty >> Version 3.0.a0

Mortbay>>Jetty >> Version 3.0.a1

Mortbay>>Jetty >> Version 3.0.a2

Mortbay>>Jetty >> Version 3.0.a3

Mortbay>>Jetty >> Version 3.0.a4

Mortbay>>Jetty >> Version 3.0.a5

Mortbay>>Jetty >> Version 3.0.a6

Mortbay>>Jetty >> Version 3.0.a7

Mortbay>>Jetty >> Version 3.0.a8

Mortbay>>Jetty >> Version 3.0.a9

Mortbay>>Jetty >> Version 3.0.a90

Mortbay>>Jetty >> Version 3.0.a91

Mortbay>>Jetty >> Version 3.0.a92

Mortbay>>Jetty >> Version 3.0.a93

Mortbay>>Jetty >> Version 3.0.a94

Mortbay>>Jetty >> Version 3.0.a95

Mortbay>>Jetty >> Version 3.0.a96

Mortbay>>Jetty >> Version 3.0.a97

Mortbay>>Jetty >> Version 3.0.a98

Mortbay>>Jetty >> Version 3.0.a99

Mortbay>>Jetty >> Version 3.0.b01

Mortbay>>Jetty >> Version 3.0.b02

Mortbay>>Jetty >> Version 3.0.b03

Mortbay>>Jetty >> Version 3.0.b04

Mortbay>>Jetty >> Version 3.0.b05

Mortbay>>Jetty >> Version 3.1

Mortbay>>Jetty >> Version 3.1

Mortbay>>Jetty >> Version 3.1

Mortbay>>Jetty >> Version 3.1

Mortbay>>Jetty >> Version 3.1

Mortbay>>Jetty >> Version 3.1

Mortbay>>Jetty >> Version 3.1

Mortbay>>Jetty >> Version 3.1

Mortbay>>Jetty >> Version 3.1

Mortbay>>Jetty >> Version 3.1

Mortbay>>Jetty >> Version 3.1.0

Mortbay>>Jetty >> Version 3.1.1

Mortbay>>Jetty >> Version 3.1.2

Mortbay>>Jetty >> Version 3.1.3

Mortbay>>Jetty >> Version 3.1.4

Mortbay>>Jetty >> Version 3.1.5

Mortbay>>Jetty >> Version 3.1.6

Mortbay>>Jetty >> Version 3.1.7

Mortbay>>Jetty >> Version 3.1.8

Mortbay>>Jetty >> Version 3.1.9

Mortbay>>Jetty >> Version 4.0

Mortbay>>Jetty >> Version 4.0

Mortbay>>Jetty >> Version 4.0

Mortbay>>Jetty >> Version 4.0.0

Mortbay>>Jetty >> Version 4.0.1

Mortbay>>Jetty >> Version 4.0.1

Mortbay>>Jetty >> Version 4.0.1

Mortbay>>Jetty >> Version 4.0.1

Mortbay>>Jetty >> Version 4.0.2

Mortbay>>Jetty >> Version 4.0.3

Mortbay>>Jetty >> Version 4.0.4

Mortbay>>Jetty >> Version 4.0.5

Mortbay>>Jetty >> Version 4.0.6

Mortbay>>Jetty >> Version 4.0.b0

Mortbay>>Jetty >> Version 4.0.b1

Mortbay>>Jetty >> Version 4.0.b2

Mortbay>>Jetty >> Version 4.0.d0

Mortbay>>Jetty >> Version 4.0.d1

Mortbay>>Jetty >> Version 4.0.d2

Mortbay>>Jetty >> Version 4.0.d3

Mortbay>>Jetty >> Version 4.0.d4

Mortbay>>Jetty >> Version 4.1.0

Mortbay>>Jetty >> Version 4.1.0

Mortbay>>Jetty >> Version 4.1.0

Mortbay>>Jetty >> Version 4.1.0

Mortbay>>Jetty >> Version 4.1.0

Mortbay>>Jetty >> Version 4.1.0

Mortbay>>Jetty >> Version 4.1.0

Mortbay>>Jetty >> Version 4.1.0

Mortbay>>Jetty >> Version 4.1.1

Mortbay>>Jetty >> Version 4.1.2

Mortbay>>Jetty >> Version 4.1.3

Mortbay>>Jetty >> Version 4.1.4

Mortbay>>Jetty >> Version 4.1.b0

Mortbay>>Jetty >> Version 4.1.b1

Mortbay>>Jetty >> Version 4.1.d0

Mortbay>>Jetty >> Version 4.1.d1

Mortbay>>Jetty >> Version 4.1.d2

Mortbay>>Jetty >> Version 4.2.0

Mortbay>>Jetty >> Version 4.2.0

Mortbay>>Jetty >> Version 4.2.0

Mortbay>>Jetty >> Version 4.2.0

Mortbay>>Jetty >> Version 4.2.1

Mortbay>>Jetty >> Version 4.2.2

Mortbay>>Jetty >> Version 4.2.3

Mortbay>>Jetty >> Version 4.2.4

Mortbay>>Jetty >> Version 4.2.4

Mortbay>>Jetty >> Version 4.2.5

Mortbay>>Jetty >> Version 4.2.6

Mortbay>>Jetty >> Version 4.2.7

Mortbay>>Jetty >> Version 4.2.8_01

Mortbay>>Jetty >> Version 4.2.9

Mortbay>>Jetty >> Version 4.2.9

Mortbay>>Jetty >> Version 4.2.9

Mortbay>>Jetty >> Version 4.2.10

Mortbay>>Jetty >> Version 4.2.10

Mortbay>>Jetty >> Version 4.2.10

Mortbay>>Jetty >> Version 4.2.10

Mortbay>>Jetty >> Version 4.2.12

Mortbay>>Jetty >> Version 4.2.14

Mortbay>>Jetty >> Version 4.2.14

Mortbay>>Jetty >> Version 4.2.14

Mortbay>>Jetty >> Version 4.2.15

Mortbay>>Jetty >> Version 4.2.15

Mortbay>>Jetty >> Version 4.2.16

Mortbay>>Jetty >> Version 4.2.17

Mortbay>>Jetty >> Version 4.2.18

Mortbay>>Jetty >> Version 4.2.19

Mortbay>>Jetty >> Version 4.2.20

Mortbay>>Jetty >> Version 4.2.20

Mortbay>>Jetty >> Version 4.2.21

Mortbay>>Jetty >> Version 4.2.22

Mortbay>>Jetty >> Version 4.2.23

Mortbay>>Jetty >> Version 4.2.23

Mortbay>>Jetty >> Version 4.2.24

Mortbay>>Jetty >> Version 4.2.24

Mortbay>>Jetty >> Version 4.2.24

Mortbay>>Jetty >> Version 4.2.25

Mortbay>>Jetty >> Version 4.2.26

Mortbay>>Jetty >> Version 4.2.27

Mortbay>>Jetty >> Version 5.0

Mortbay>>Jetty >> Version 5.0

Mortbay>>Jetty >> Version 5.0

Mortbay>>Jetty >> Version 5.0

Mortbay>>Jetty >> Version 5.0

Mortbay>>Jetty >> Version 5.0

Mortbay>>Jetty >> Version 5.0

Mortbay>>Jetty >> Version 5.0

Mortbay>>Jetty >> Version 5.0

Mortbay>>Jetty >> Version 5.0

Mortbay>>Jetty >> Version 5.0

Mortbay>>Jetty >> Version 5.0.0

Mortbay>>Jetty >> Version 5.0.0

Mortbay>>Jetty >> Version 5.1

Mortbay>>Jetty >> Version 5.1

Mortbay>>Jetty >> Version 5.1.0

Mortbay>>Jetty >> Version 5.1.1

Mortbay>>Jetty >> Version 5.1.1

Mortbay>>Jetty >> Version 5.1.1

Mortbay>>Jetty >> Version 5.1.2

Mortbay>>Jetty >> Version 5.1.2

Mortbay>>Jetty >> Version 5.1.3

Mortbay>>Jetty >> Version 5.1.3

Mortbay>>Jetty >> Version 5.1.3

Mortbay>>Jetty >> Version 5.1.3

Mortbay>>Jetty >> Version 5.1.3

Mortbay>>Jetty >> Version 5.1.3

Mortbay>>Jetty >> Version 5.1.4

Mortbay>>Jetty >> Version 5.1.4

Mortbay>>Jetty >> Version 5.1.5

Mortbay>>Jetty >> Version 5.1.5

Mortbay>>Jetty >> Version 5.1.5

Mortbay>>Jetty >> Version 5.1.5

Mortbay>>Jetty >> Version 5.1.6

Mortbay>>Jetty >> Version 5.1.7

Mortbay>>Jetty >> Version 5.1.7

Mortbay>>Jetty >> Version 5.1.8

Mortbay>>Jetty >> Version 5.1.9

Mortbay>>Jetty >> Version 5.1.10

Mortbay>>Jetty >> Version 5.1.11

Mortbay>>Jetty >> Version 5.1.11

Mortbay>>Jetty >> Version 5.1.12

Mortbay>>Jetty >> Version 5.1.13

Mortbay>>Jetty >> Version 5.1.14

Mortbay>>Jetty >> Version 6.0.0

Mortbay>>Jetty >> Version 6.0.0

Mortbay>>Jetty >> Version 6.0.0

Mortbay>>Jetty >> Version 6.0.0

Mortbay>>Jetty >> Version 6.0.0

Mortbay>>Jetty >> Version 6.0.0

Mortbay>>Jetty >> Version 6.0.0

Mortbay>>Jetty >> Version 6.0.0

Mortbay>>Jetty >> Version 6.0.0

Mortbay>>Jetty >> Version 6.0.0

Mortbay>>Jetty >> Version 6.0.0

Mortbay>>Jetty >> Version 6.0.0

Mortbay>>Jetty >> Version 6.0.0

Mortbay>>Jetty >> Version 6.0.0

Mortbay>>Jetty >> Version 6.0.0

Mortbay>>Jetty >> Version 6.0.0

Mortbay>>Jetty >> Version 6.0.0

Mortbay>>Jetty >> Version 6.0.0

Mortbay>>Jetty >> Version 6.0.0

Mortbay>>Jetty >> Version 6.0.0

Mortbay>>Jetty >> Version 6.0.0

Mortbay>>Jetty >> Version 6.0.0

Mortbay>>Jetty >> Version 6.0.0

Mortbay>>Jetty >> Version 6.0.0

Mortbay>>Jetty >> Version 6.0.0

Mortbay>>Jetty >> Version 6.0.0

Mortbay>>Jetty >> Version 6.0.0

Mortbay>>Jetty >> Version 6.0.0

Mortbay>>Jetty >> Version 6.0.1

Mortbay>>Jetty >> Version 6.0.2

Mortbay>>Jetty >> Version 6.1.0

Mortbay>>Jetty >> Version 6.1.0

Mortbay>>Jetty >> Version 6.1.0

Mortbay>>Jetty >> Version 6.1.0

Mortbay>>Jetty >> Version 6.1.0

Mortbay>>Jetty >> Version 6.1.0

Mortbay>>Jetty >> Version 6.1.0

Mortbay>>Jetty >> Version 6.1.0

Mortbay>>Jetty >> Version 6.1.0

Mortbay>>Jetty >> Version 6.1.1

Mortbay>>Jetty >> Version 6.1.1

Mortbay>>Jetty >> Version 6.1.2

Mortbay>>Jetty >> Version 6.1.2

Mortbay>>Jetty >> Version 6.1.2

Mortbay>>Jetty >> Version 6.1.2

Mortbay>>Jetty >> Version 6.1.2

Mortbay>>Jetty >> Version 6.1.2

Mortbay>>Jetty >> Version 6.1.2

Mortbay>>Jetty >> Version 6.1.2

Mortbay>>Jetty >> Version 6.1.2

Mortbay>>Jetty >> Version 6.1.3

Mortbay>>Jetty >> Version 6.1.4

Mortbay>>Jetty >> Version 6.1.4

Mortbay>>Jetty >> Version 6.1.4

Mortbay>>Jetty >> Version 6.1.5

Mortbay>>Jetty >> Version 6.1.5

Mortbay>>Jetty >> Version 6.1.6

Mortbay>>Jetty >> Version 6.1.6

Mortbay>>Jetty >> Version 6.1.6

Mortbay>>Jetty >> Version 6.1.7

Mortbay>>Jetty >> Version 6.1.8

Mortbay>>Jetty >> Version 6.1.9

Mortbay>>Jetty >> Version 6.1.10

Mortbay>>Jetty >> Version 6.1.11

Mortbay>>Jetty >> Version 6.1.12

Mortbay>>Jetty >> Version 6.1.12

Mortbay>>Jetty >> Version 6.1.12

Mortbay>>Jetty >> Version 6.1.12

Mortbay>>Jetty >> Version 6.1.12

Mortbay>>Jetty >> Version 6.1.12

Mortbay>>Jetty >> Version 6.1.14

Mortbay>>Jetty >> Version 6.1.15

Mortbay>>Jetty >> Version 6.1.15

Mortbay>>Jetty >> Version 6.1.15

Mortbay>>Jetty >> Version 6.1.15

Mortbay>>Jetty >> Version 6.1.15

Mortbay>>Jetty >> Version 6.1.15

Mortbay>>Jetty >> Version 7.0.0

Mortbay>>Jetty >> Version 7.0.0

Mortbay>>Jetty >> Version 7.0.0

Mortbay>>Jetty >> Version 7.0.0

Mortbay>>Jetty >> Version 7.0.0

Références

http://www.securityfocus.com/bid/34800
Tags : vdb-entry, x_refsource_BID
http://www.vupen.com/english/advisories/2010/1792
Tags : vdb-entry, x_refsource_VUPEN
http://secunia.com/advisories/35776
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.securitytracker.com/id?1022563
Tags : vdb-entry, x_refsource_SECTRACK
http://www.vupen.com/english/advisories/2009/1900
Tags : vdb-entry, x_refsource_VUPEN
http://secunia.com/advisories/34975
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.securityfocus.com/bid/35675
Tags : vdb-entry, x_refsource_BID
http://secunia.com/advisories/35225
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/35143
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/40553
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.kb.cert.org/vuls/id/402580
Tags : third-party-advisory, x_refsource_CERT-VN