SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service
Report a Bug
Report a vulnerability that you have found to SecurityTracker
bugs
@
securitytracker.com






Category:   Application (Security)  >   IBM Tivoli Access Manager Vendors:   IBM
IBM Tivoli Access Manager for e-Business Lets Remote Users Traverse the Directory
SecurityTracker Alert ID:  1024927
SecurityTracker URL:  http://securitytracker.com/id/1024927
CVE Reference:   CVE-2010-4622   (Links to External Site)
Updated:  Jan 7 2011
Original Entry Date:  Dec 28 2010
Impact:   Disclosure of system information, Disclosure of user information
Fix Available:  Yes  Vendor Confirmed:  Yes  Exploit Included:  Yes  
Version(s): 6.1.1
Description:   A vulnerability was reported in IBM Tivoli Access Manager for e-Business. A remote user can view files on the target system.

The software does not properly validate user-supplied input. A remote user can supply a specially crafted request containing certain character encodings to view files on target system that are located outside of the document directory.

IBM AIX is affected.

A demonstration exploit URL is provided:

https://[target]/%uff0e%uff0e/%uff0e%uff0e/%uff0e%uff0e\
/%uff0e%uff0e/etc/passwd

Impact:   A remote user can view files on the target system.
Solution:   The vendor has issued a fix (Patch 6.1.1-TIV-AWS-FP0001).

The vendor's advisory is available at:

http://www-01.ibm.com/support/docview.wss?uid=swg24028829

Vendor URL:  www-01.ibm.com/support/docview.wss?uid=swg24028829 (Links to External Site)
Cause:   Input validation error
Underlying OS:   UNIX (AIX)

Message History:   None.


 Source Message Contents

Date:  Tue, 28 Dec 2010 17:05:06 +0000
Subject:  IBM Tivoli Access Manager for e-Business / WebSEAL


http://www.ibm.com/support/docview.wss?uid=swg24028829

Internal defect: 102969
Symptom: WebSEAL does not protect against directory traversal when
certain character encodings are used on AIX. An example
request which exhibits this vulnerability is:
https://<webseal>/%uff0e%uff0e/%uff0e%uff0e/%uff0e%uff0e\
/%uff0e%uff0e/etc/passwd

The change associated with this fix can be reverted by setting
the 'unalias-directory-traversal-characters' configuration entry
within the '[server]' stanza to false. 
 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

Copyright 2014, SecurityGlobal.net LLC