Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

This site is deprecated. Please CLICK HERE for latest updates

Short Name

HTTP:DIR:NETGAIN-DIR-TRAV

Severity

Major

Recommended

Yes

Recommended Action

Drop

Category

HTTP

Keywords

NetGain Systems Enterprise Manager Directory Traversal

Release Date

2018/01/09

Update Number

3024

Supported Platforms

idp-4.0+, isg-3.0+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+

HTTP: NetGain Systems Enterprise Manager Directory Traversal


A directory traversal vulnerability exists in NetGain Systems Enterprise Manager. A remote unauthenticated attacker can exploit this vulnerability by sending a crafted request. Successful exploitation could allow an attacker to delete arbitrary files with privileges of SYSTEM and lead to denial of service condition.

Extended Description

This vulnerability allows remote attackers to delete arbitrary files on vulnerable installations of NetGain Systems Enterprise Manager 7.2.730 build 1034. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the org.apache.jsp.u.jsp.reports.templates.misc.sample_jsp servlet, which listens on TCP port 8081 by default. When parsing the type parameter, the process does not properly validate a user-supplied path prior to using it in file operations. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of Administrator. Was ZDI-CAN-5190.

Affected Products

  • Netgain-systems enterprise_manager 7.2.730

References

  • CVE: CVE-2017-16599
  • URL: http://www.zerodayinitiative.com/advisories/zdi-17-964/

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out