An issue was discovered in Zoho ManageEngine Netflow Analyzer Professional 7.0.0.2. An Absolute Path Traversal vulnerability in the Administration zone, in /netflow/servlet/CReportPDFServlet (via the parameter schFilePath), allows remote authenticated users to bypass intended SecurityManager restrictions and list a parent directory via any file name, such as a schFilePath=C:\boot.ini value.
References
Link | Resource |
---|---|
https://www.manageengine.com/products/netflow/?doc | Product Vendor Advisory |
https://www.exploit-db.com/exploits/46425/ | Exploit Third Party Advisory VDB Entry |
http://seclists.org/fulldisclosure/2019/Feb/45 | Mailing List Not Applicable Exploit Third Party Advisory |
http://packetstormsecurity.com/files/151757/Zoho-ManageEngine-Netflow-Analyzer-Professional-7.0.0.2-Traversal-XSS.html | Exploit VDB Entry Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2019-05-16 19:29
Updated : 2019-05-17 09:37
NVD link : CVE-2019-8925
Mitre link : CVE-2019-8925
JSON object : View
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Products Affected
zohocorp
- manageengine_netflow_analyzer