Directory Traversal Vulnerability in VMTurbo Operations Manager- 4.5 or earlier

From: jpecou@gmail.com
To: bugtraq@securityfocus.com
Cc:
Subject: Directory Traversal Vulnerability in VMTurbo Operations Manager- 4.5 or earlier
Date:


Product: VM Turbo Operations Manager
Vendor: VM Turbo
Vulnerable Version(s): 4.5.x earlier
Tested Version: 4.0
Advisory Publication: April 11, 2014 
Vendor Notification: April 11, 2014 
Public Disclosure: May 8, 2014 
Vulnerability Type: Directory Traversal

Discovered and Provided: (Jamal Pecou) Security Focus ( https://www.securityfocus.com/ )

------------------------------------------------------------------------
-----------------------

Advisory Details:

A vulnerability affecting \u201c/cgi-bin/help/doIt.cgi" in VM Turbo Operations Manager allows directory traversal when the URL encoded POST input \u201cxml_path\u201d was set to \u201c../../../../../../../../../../etc/passwd\u201d we could see the contents of this file. 


The following exploitation example displays the contents of /etc/passwd

http://[host]/cgi-bin/help/doIt.cgi?FUNC=load_xml_file&xml_path=../../../../../../../../../../etc/passwd

------------------------------------------------------------------------
-----------------------

Solution:

 The vendor has released a fix for this vulnerability in version 4.6.

References:

[1] https://support.vmturbo.com/hc/en-us/articles/203170127-VMTurbo-Operations-Manager-v4-6-Announcement





Copyright © 1995-2018 LinuxRocket.net. All rights reserved.