Directory traversal vulnerability in aws_tmxn.exe in the Admin Agent service in the server in EMC Documentum ApplicationXtender Workflow, possibly 5.40 SP1 and earlier, allows remote attackers to upload arbitrary files, and execute arbitrary code, via directory traversal sequences in requests to TCP port 2606.
References
Link | Resource |
---|---|
http://secunia.com/advisories/37070 | Vendor Advisory |
http://www.zerodayinitiative.com/advisories/ZDI-08-095/ |
Configurations
Configuration 1 (hide)
|
Information
Published : 2009-10-22 09:00
Updated : 2009-11-19 21:00
NVD link : CVE-2008-3685
Mitre link : CVE-2008-3685
JSON object : View
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Products Affected
emc
- documentum_applicationxtender_workflow_manager