Directory traversal vulnerability in RealOne Player, RealOne Player 2.0, and RealOne Enterprise Desktop allows remote attackers to upload arbitrary files via an RMP file that contains .. (dot dot) sequences in a .rjs skin file.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/9580 | Patch Vendor Advisory |
http://service.real.com/help/faq/security/040123_player/EN/ | Patch Vendor Advisory |
http://www.kb.cert.org/vuls/id/514734 | US Government Resource |
http://marc.info/?l=bugtraq&m=107642978524321&w=2 | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/15123 |
Configurations
Configuration 1 (hide)
|
Information
Published : 2004-11-22 21:00
Updated : 2017-10-09 18:30
NVD link : CVE-2004-0273
Mitre link : CVE-2004-0273
JSON object : View
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Products Affected
realnetworks
- realone_enterprise_desktop
- realone_desktop_manager
- realone_player