Vulnerability CVE-2011-0497


Published: 2011-01-20   Modified: 2012-02-13

Description:
Directory traversal vulnerability in Sybase EAServer 6.x before 6.3 ESD#2, as used in Appeon, Replication Server Messaging Edition (RSME), and WorkSpace, allows remote attackers to read arbitrary files via "../\" (dot dot forward-slash backslash) sequences in a crafted request.

Type:

CWE-22

(Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal'))

CVSS2 => (AV:N/AC:L/Au:N/C:C/I:N/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
7.8/10
6.9/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Complete
None
None
Affected software
Sybase -> Appeon for powerbuilder 
Sybase -> Easerver 
Sybase -> Replication server 
Sybase -> Sybase workspace 

 References:
http://xforce.iss.net/xforce/xfdb/64695
http://www.vupen.com/english/advisories/2011/0125
http://www.sybase.com/detail?id=1091057
http://www.securityfocus.com/bid/45809
http://secunia.com/advisories/42904
http://osvdb.org/70427
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=889

Copyright 2021, cxsecurity.com

 

Back to Top