Information disclosure in NetIQ Sentinel - CVE-2016-1605
Published: July 4, 2017
Vulnerability identifier: #VU7300
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2016-1605
CWE-ID: CWE-22
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vendor: Novell
Affected software:
NetIQ Sentinel
NetIQ Sentinel
Detailed vulnerability description
The vulnerability allows a remote authenticated attacker to obtain potentially sensitive information.
The weakness exists in the ReportViewServlet servlet of Novell NetIQ Sentine due to path traversal. A remote attacker can use a PREVIEW value for the fileType field, conduct directory traversal attack and read arbitrary files on the system.
Successful exploitation of the vulnerability results in information disclosure.
The weakness exists in the ReportViewServlet servlet of Novell NetIQ Sentine due to path traversal. A remote attacker can use a PREVIEW value for the fileType field, conduct directory traversal attack and read arbitrary files on the system.
Successful exploitation of the vulnerability results in information disclosure.
How to mitigate CVE-2016-1605
Update to version 7.4.2.