NTT Data TERASOLUNA Server Framework for Java(WEB) 2.0.0.1 through 2.0.6.1, as used in Fujitsu Interstage Business Application Server and other products, allows remote attackers to bypass a file-extension protection mechanism, and consequently read arbitrary files, via a crafted pathname.
References
Link | Resource |
---|---|
http://www.fujitsu.com/jp/products/software/resources/condition/security/vulnerabilities/2016/index.html#CVE-2016-1183 | Vendor Advisory |
http://jvn.jp/en/jp/JVN74659077/index.html | Vendor Advisory |
http://jvndb.jvn.jp/jvndb/JVNDB-2016-000098 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2016-06-18 18:59
Updated : 2016-06-23 04:58
NVD link : CVE-2016-1183
Mitre link : CVE-2016-1183
JSON object : View
CWE
CWE-264
Permissions, Privileges, and Access Controls
Products Affected
nttdata
- terasoluna_server_framework_for_java_web