This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Netgain Enterprise Manager. Authentication is not required to exploit this vulnerability. The specific flaw exists within upload_save_do.jsp. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code under the context of the current user. Was ZDI-CAN-4751.
References
Link | Resource |
---|---|
https://zerodayinitiative.com/advisories/ZDI-17-952 | Third Party Advisory VDB Entry |
https://www.tenable.com/security/research/tra-2018-02 | Third Party Advisory |
Configurations
Information
Published : 2018-01-22 17:29
Updated : 2019-10-09 16:25
NVD link : CVE-2017-16610
Mitre link : CVE-2017-16610
JSON object : View
CWE
CWE-668
Exposure of Resource to Wrong Sphere
Products Affected
netgain-systems
- enterprise_manager