VMware View Connection Server Directory Traversal

2012.12.15
Credit: r@b13$
Risk: Medium
Local: No
Remote: Yes
CWE: CWE-22


CVSS Base Score: 5/10
Impact Subscore: 2.9/10
Exploitability Subscore: 10/10
Exploit range: Remote
Attack complexity: Low
Authentication: No required
Confidentiality impact: Partial
Integrity impact: None
Availability impact: None

Title ----- DDIVRT-2012-48 VMware View Connection Server Directory Traversal (CVE-2012-5978) Severity -------- High Date Discovered --------------- September 26, 2012 Discovered By ------------- Digital Defense, Inc. Vulnerability Research Team Credit: r@b13$ Vulnerability Description ------------------------- The tunnel-server component of the VMware View Connection Server fails to ensure that each requested URL refers to a file that is both located within the web root of the server and is of a type that is allowed to be served. A remote unauthenticated attacker can use this weakness to retrieve arbitrary files from the affected server's underlying root file system. This can be accomplished by submitting URL encoded HTTP GET requests that traverse out of the affected subdirectory. Solution Description -------------------- VMware has produced a solution for the issue in the form of an upgrade which is available through their website. The VMware advisory can be found: http://www.vmware.com/security/advisories/VMSA-2012-0017.html Vulnerable Software ------------------------- VMware View 5.x prior to version 5.1.2 VMware View 4.x prior to version 4.6.2 Vendor Contact -------------- Vendor Name: VMware, Inc. Vendor Website: http://www.vmware.com/

References:

http://www.vmware.com/


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top