Описание
Directory traversal vulnerability in the agentUpload servlet in ZOHO ManageEngine EventLog Analyzer 9.0 build 9002 and 8.2 build 8020 allows remote attackers to execute arbitrary code by uploading a ZIP file which contains an executable file with .. (dot dot) sequences in its name, then accessing the executable via a direct request to the file under the web root. Fixed in Build 11072.
Directory traversal vulnerability in the agentUpload servlet in ZOHO ManageEngine EventLog Analyzer 9.0 build 9002 and 8.2 build 8020 allows remote attackers to execute arbitrary code by uploading a ZIP file which contains an executable file with .. (dot dot) sequences in its name, then accessing the executable via a direct request to the file under the web root. Fixed in Build 11072.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2014-6037
- https://github.com/rapid7/metasploit-framework/pull/3732
- https://www.mogwaisecurity.de/advisories/MSA-2014-01.txt
- http://osvdb.org/show/osvdb/110642
- http://packetstormsecurity.com/files/128102/ManageEngine-EventLog-Analyzer-9.9-Authorization-Code-Execution.html
- http://seclists.org/fulldisclosure/2014/Aug/86
- http://seclists.org/fulldisclosure/2014/Sep/1
- http://seclists.org/fulldisclosure/2014/Sep/19
- http://seclists.org/fulldisclosure/2014/Sep/20
- http://www.exploit-db.com/exploits/34519
- http://www.securityfocus.com/bid/69482
Связанные уязвимости
Directory traversal vulnerability in the agentUpload servlet in ZOHO ManageEngine EventLog Analyzer 9.0 build 9002 and 8.2 build 8020 allows remote attackers to execute arbitrary code by uploading a ZIP file which contains an executable file with .. (dot dot) sequences in its name, then accessing the executable via a direct request to the file under the web root. Fixed in Build 11072.