This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Netgain Enterprise Manager. Authentication is not required to exploit this vulnerability. The specific flaw exists within upload_save_do.jsp. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code under the context of the current user. Was ZDI-CAN-4751.
References
Link | Resource |
---|---|
https://www.tenable.com/security/research/tra-2018-02 | Third Party Advisory |
https://zerodayinitiative.com/advisories/ZDI-17-952 | Third Party Advisory VDB Entry |
Configurations
History
No history.
Information
Published : 2018-01-23 01:29
Updated : 2019-10-09 23:25
NVD link : CVE-2017-16610
Mitre link : CVE-2017-16610
CVE.ORG link : CVE-2017-16610
JSON object : View
Products Affected
netgain-systems
- enterprise_manager