HTTP: Generic Directory Traversal Signature 2

This signature detects attempts to exploit a Directory Traversal. A successful attack can lead to arbitrary code execution or disclosure of information or both.

Extended Description

This vulnerability allows remote attackers to execute code by overwriting arbitrary files on vulnerable installations of NetGain Systems Enterprise Manager 7.2.730 build 1034. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the org.apache.jsp.u.jsp.tools.snmpwalk.snmpwalk_005fdo_jsp servlet, which listens on TCP port 8081 by default. When parsing the ip parameter, the process does not properly validate a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code under the context of Administrator. Was ZDI-CAN-5138.

Affected Products

Netgain-systems enterprise_manager

Short Name
HTTP:DIR:GENERIC-TRAVERSAL-2
Severity
Major
Recommended
False
Recommended Action
None
Category
HTTP
Keywords
2 CVE-2014-3914 CVE-2014-5005 CVE-2014-6034 CVE-2014-6035 CVE-2014-9404 CVE-2015-8249 CVE-2016-8525 CVE-2017-16598 CVE-2018-12613 Directory Generic Signature Traversal bid:69494
Release Date
06/18/2019
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3730
False Positive
Rarely
Vendors

Netgain-systems

Found a potential security threat?