Directory traversal vulnerability in the Instance Monitor in Ericsson Drutt Mobile Service Delivery Platform (MSDP) 4, 5, and 6 allows remote attackers to read arbitrary files via a ..%2f (dot dot encoded slash) in the default URI.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:26
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/131233/Ericsson-Drutt-MSDP-Instance-Monitor-Directory-Traversal-File-Access.html - Exploit | |
References | () http://www.securityfocus.com/bid/73901 - | |
References | () https://www.exploit-db.com/exploits/36619/ - |
Information
Published : 2015-04-06 15:59
Updated : 2024-11-21 02:26
NVD link : CVE-2015-2166
Mitre link : CVE-2015-2166
CVE.ORG link : CVE-2015-2166
JSON object : View
Products Affected
ericsson
- drutt_mobile_service_delivery_platform
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')