HTTP: Parameter Directory Traversal 1

This signature detects directory traversal attempts within HTTP GET or POST form parameters. Attackers can exploit a poorly-written CGI program to access or modify private files.

Extended Description

Multiple directory traversal vulnerabilities in the AgentController in Red Hat CloudForms Management Engine 2.0 allow remote attackers to create and overwrite arbitrary files via a .. (dot dot) in the filename parameter to the (1) log, (2) upload, or (3) linuxpkgs method.

Affected Products

Redhat cloudforms_management_engine

Short Name
HTTP:DIR:PARAMETER-TRAVERSE-1
Severity
Minor
Recommended
False
Recommended Action
None
Category
HTTP
Keywords
1 CVE-2009-1911 CVE-2010-0943 CVE-2010-0953 CVE-2010-0972 CVE-2010-1057 CVE-2010-1058 CVE-2010-1060 CVE-2010-1306 CVE-2010-1313 CVE-2010-1999 CVE-2010-2129 CVE-2010-2507 CVE-2010-4282 CVE-2012-5330 CVE-2013-2068 CVE-2014-10001 CVE-2014-3440 CVE-2014-3914 CVE-2015-8249 CVE-2016-6600 CVE-2017-16598 CVE-2017-6621 CVE-2017-6635 CVE-2017-9812 CVE-2023-26469 Directory Parameter Traversal bid:37692 bid:38731 bid:38925 bid:39200 bid:39237 bid:40179 bid:41031 bid:45112 bid:67779 bid:98522 bid:98535 bid:99330
Release Date
08/23/2016
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3716
False Positive
Rarely
Vendors

Redhat

CVSS Score

7.5

6.5

4.3

9.0

10.0

6.8

9.4

5.0

Found a potential security threat?