In the web interface of Parallels Remote Application Server (RAS) 15.5 Build 16140, a vulnerability exists due to improper validation of the file path when requesting a resource under the "RASHTML5Gateway" directory. A remote, unauthenticated attacker could exploit this weakness to read arbitrary files from the vulnerable system using path traversal sequences.
References
Link | Resource |
---|---|
https://blog.runesec.com/2018/02/22/parallels-ras-path-traversal/ | Exploit Third Party Advisory |
https://www.exploit-db.com/exploits/442321/ | Broken Link |
Configurations
Information
Published : 2018-02-28 07:29
Updated : 2018-03-23 09:03
NVD link : CVE-2017-9447
Mitre link : CVE-2017-9447
JSON object : View
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Products Affected
parallels
- remote_application_server