Directory traversal vulnerability in diag.jsp file in CA Unified Infrastructure Management (formerly CA Nimsoft Monitor) 8.4 SP1 and earlier and CA Unified Infrastructure Management Snap (formerly CA Nimsoft Monitor Snap) allows remote attackers to read arbitrary files via unspecified vectors.
References
Link | Resource |
---|---|
https://www.ca.com/us/services-support/ca-support/ca-support-online/product-content/recommended-reading/security-notices/ca20161109-01-security-notice-for-ca-unified-infrastructure-mgmt.html | Vendor Advisory |
http://www.zerodayinitiative.com/advisories/ZDI-16-607 | Third Party Advisory VDB Entry |
http://www.securityfocus.com/bid/94257 | Third Party Advisory VDB Entry |
http://seclists.org/fulldisclosure/2016/Nov/55 | Third Party Advisory VDB Entry |
http://packetstormsecurity.com/files/139661/CA-Unified-Infrastructure-Management-Bypass-Traversal-Disclosure.html | Third Party Advisory VDB Entry |
Configurations
Information
Published : 2017-03-07 07:59
Updated : 2017-03-09 10:32
NVD link : CVE-2016-9164
Mitre link : CVE-2016-9164
JSON object : View
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Products Affected
ca
- unified_infrastructure_management