Directory traversal vulnerability in jretest.html in WebConnect 6.5 and 6.4.4, and possibly earlier versions, allows remote attackers to read keys within arbitrary INI formatted files via "..//" sequences in the WCP_USER parameter.
References
Link | Resource |
---|---|
http://marc.info/?l=bugtraq&m=110910838600145&w=2 | |
http://secunia.com/advisories/14006/ | Patch |
http://www.cirt.dk/advisories/cirt-29-advisory.pdf | Exploit Patch Vendor Advisory |
http://www.kb.cert.org/vuls/id/628411 | Third Party Advisory US Government Resource |
http://www.kb.cert.org/vuls/id/JSHA-69HVPK | Third Party Advisory US Government Resource |
https://exchange.xforce.ibmcloud.com/vulnerabilities/19394 | |
http://marc.info/?l=bugtraq&m=110910838600145&w=2 | |
http://secunia.com/advisories/14006/ | Patch |
http://www.cirt.dk/advisories/cirt-29-advisory.pdf | Exploit Patch Vendor Advisory |
http://www.kb.cert.org/vuls/id/628411 | Third Party Advisory US Government Resource |
http://www.kb.cert.org/vuls/id/JSHA-69HVPK | Third Party Advisory US Government Resource |
https://exchange.xforce.ibmcloud.com/vulnerabilities/19394 |
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:48
Type | Values Removed | Values Added |
---|---|---|
References | () http://marc.info/?l=bugtraq&m=110910838600145&w=2 - | |
References | () http://secunia.com/advisories/14006/ - Patch | |
References | () http://www.cirt.dk/advisories/cirt-29-advisory.pdf - Exploit, Patch, Vendor Advisory | |
References | () http://www.kb.cert.org/vuls/id/628411 - Third Party Advisory, US Government Resource | |
References | () http://www.kb.cert.org/vuls/id/JSHA-69HVPK - Third Party Advisory, US Government Resource | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/19394 - |
Information
Published : 2004-12-31 05:00
Updated : 2025-04-03 01:03
NVD link : CVE-2004-0465
Mitre link : CVE-2004-0465
CVE.ORG link : CVE-2004-0465
JSON object : View
Products Affected
openconnect
- webconnect
CWE