Micro Focus Novell Service Desk up to 7.1 multipart/form-data LiveTime.woa POST Request path traversal
CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
---|---|---|
7.0 | $0-$5k | 0.00 |
A vulnerability was found in Micro Focus Novell Service Desk up to 7.1. It has been rated as critical. Affected by this issue is an unknown code of the file LiveTime.woa of the component multipart/form-data Handler. The manipulation as part of a POST Request leads to a path traversal vulnerability. Using CWE to declare the problem leads to CWE-22. The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory. Impacted is confidentiality, integrity, and availability. CVE summarizes:
Directory traversal vulnerability in the import users feature in Micro Focus Novell Service Desk before 7.2 allows remote authenticated administrators to upload and execute arbitrary JSP files via a .. (dot dot) in a filename within a multipart/form-data POST request to a LiveTime.woa URL.
The weakness was disclosed 04/22/2016 (Website). The advisory is shared for download at securityfocus.com. This vulnerability is handled as CVE-2016-1593 since 01/11/2016. The attack may be launched remotely. A simple authentication is needed for exploitation. Technical details as well as a public exploit are known. The MITRE ATT&CK project declares the attack technique as T1006.
The exploit is available at exploit-db.com. It is declared as highly functional.
Upgrading to version 7.2 eliminates this vulnerability.
The vulnerability is also documented in the vulnerability database at Exploit-DB (39708). The entry VDB-82775 is pretty similar. If you want to get best quality of vulnerability data, you may have to visit VulDB.
Product
Vendor
Name
Version
License
Support
- end of life (old version)
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 7.2VulDB Meta Temp Score: 7.0
VulDB Base Score: 7.2
VulDB Temp Score: 6.9
VulDB Vector: 🔍
VulDB Reliability: 🔍
NVD Base Score: 7.2
NVD Vector: 🔍
CVSSv2
AV | AC | Au | C | I | A |
---|---|---|---|---|---|
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
---|---|---|---|---|---|
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Path traversalCWE: CWE-22
CAPEC: 🔍
ATT&CK: 🔍
Local: No
Remote: Yes
Availability: 🔍
Access: Public
Status: Highly functional
Download: 🔍
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
0-Day | unlock | unlock | unlock | unlock |
---|---|---|---|---|
Today | unlock | unlock | unlock | unlock |
OpenVAS ID: 801951
OpenVAS Name: Novell Service Desk Multiple Vulnerabilities
OpenVAS File: 🔍
OpenVAS Family: 🔍
MetaSploit ID: novell_servicedesk_rce.rb
MetaSploit Name: Novell ServiceDesk Authenticated File Upload
MetaSploit File: 🔍
Exploit-DB: 🔍
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
Upgrade: Novell Service Desk 7.2
Timeline
01/11/2016 🔍04/22/2016 🔍
04/22/2016 🔍
04/24/2016 🔍
08/31/2024 🔍
Sources
Vendor: microfocus.comAdvisory: 136717⛔
Status: Not defined
Confirmation: 🔍
CVE: CVE-2016-1593 (🔍)
scip Labs: https://www.scip.ch/en/?labs.20161013
See also: 🔍
Entry
Created: 04/24/2016 09:11 AMUpdated: 08/31/2024 03:35 PM
Changes: 04/24/2016 09:11 AM (50), 10/21/2018 09:55 AM (22), 07/26/2022 02:34 PM (3), 08/31/2024 03:35 PM (14)
Complete: 🔍
Cache ID: 18:9CC:40
No comments yet. Languages: en.
Please log in to comment.