HTTP: Parameter Directory Traversal 1
This signature detects directory traversal attempts within HTTP GET or POST form parameters. Attackers can exploit a poorly-written CGI program to access or modify private files.
Extended Description
Multiple directory traversal vulnerabilities in the AgentController in Red Hat CloudForms Management Engine 2.0 allow remote attackers to create and overwrite arbitrary files via a .. (dot dot) in the filename parameter to the (1) log, (2) upload, or (3) linuxpkgs method.
Affected Products
Redhat cloudforms_management_engine
References
BugTraq: 39200 98522 38731 38925 40179 99330 67779 41031 45112 98535 37692 39237
CVE: CVE-2023-26469
URL: https://blogs.securiteam.com/index.php/archives/2712 http://seclists.org/fulldisclosure/2016/Aug/54 https://community.rapid7.com/community/infosec/blog/2015/12/14/r7-2015-22-manageengine-desktop-central-9-fileuploadservlet-connectionid-vulnerability-cve-2015-8249 http://console-cowboys.blogspot.com/2014/03/the-curious-case-of-ninjamonkeypiratela.html
srx-branch-12.3
srx-19.3
srx-branch-19.3
vsrx3bsd-19.2
srx-branch-19.4
vsrx-19.4
mx-12.3
mx-19.4
vmx-19.4
mx-19.3
vsrx3bsd-19.4
srx-19.4
vsrx-12.3
vmx-19.3
vsrx-19.2
srx-12.3
Redhat
7.5
6.5
4.3
9.0
10.0
6.8
9.4
5.0