Home    |    View Topics    |    Search    |    Contact Us    |   



Category:   Application (Generic)  >   IBM Director Vendors:   IBM
IBM Director Input Validation Flaw in 'Redirect.bat' Lets Remote Users Traverse the Directory
SecurityTracker Alert ID:  1016815
SecurityTracker URL:
CVE Reference:   CVE-2006-4681   (Links to External Site)
Updated:  Jun 3 2008
Original Entry Date:  Sep 8 2006
Impact:   Disclosure of system information, Disclosure of user information
Exploit Included:  Yes  
Version(s): prior to 5.10
Description:   A vulnerability was reported in IBM Director. A remote user can view files on the target system.

The 'Redirect.bat' script does not properly validate user-supplied input in the 'file' parameter. A remote user can supply a specially crafted request to view files on target system that are located outside of the document directory.

A demonstration exploit URL is provided:

http://[target]:411/cgi-bin/Redirect.bat?file=%7C..\..\..\..\..\..\....\..\program%20files\ibm\director\version.key (or insert evil file here)

Daniel Clemens reported this vulnerability.

The original advisory is available at:

Impact:   A remote user can view files on the target system.
Solution:   The report indicates that this vulnerability was fixed in version 5.10. However, the vendor's release notes do not mention this vulnerability.
Vendor URL: (Links to External Site)
Cause:   Input validation error

Message History:   None.

 Source Message Contents

[Original Message Not Available for Viewing]

Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, LLC