HTTP: NetGain Systems Enterprise Manager Directory Traversal

A directory traversal vulnerability exists in NetGain Systems Enterprise Manager. A remote unauthenticated attacker can exploit this vulnerability by sending a crafted request. Successful exploitation could allow an attacker to delete arbitrary files with privileges of SYSTEM and lead to denial of service condition.

Extended Description

This vulnerability allows remote attackers to delete arbitrary files on vulnerable installations of NetGain Systems Enterprise Manager 7.2.730 build 1034. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the org.apache.jsp.u.jsp.reports.templates.misc.sample_jsp servlet, which listens on TCP port 8081 by default. When parsing the type parameter, the process does not properly validate a user-supplied path prior to using it in file operations. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of Administrator. Was ZDI-CAN-5190.

Affected Products

Netgain-systems enterprise_manager

Short Name
HTTP:DIR:NETGAIN-DIR-TRAV
Severity
Major
Recommended
True
Recommended Action
Drop
Category
HTTP
Keywords
CVE-2017-16599 Directory Enterprise Manager NetGain Systems Traversal
Release Date
01/09/2018
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3337
False Positive
Unknown
Vendors

Netgain-systems

CVSS Score

4.0

Found a potential security threat?