#VU15918 Path traversal in IBM WebSphere Application Server


Published: 2018-11-15 | Updated: 2018-11-16

Vulnerability identifier: #VU15918

Vulnerability risk: Low

CVSSv3.1: 5.5 [CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2018-1797

CWE-ID: CWE-22

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
IBM WebSphere Application Server
Server applications / Application servers

Vendor: IBM Corporation

Description

The vulnerability allows a remote attacker to conduct directory traversal attack.

The vulnerability exists due to improper validation of user-supplied input on systems that have an Enterprise Bundle Archive (EBA) installed and with a path external to the EBA. A remote attacker can trick the victim into extracting a specially crafted ZIP archive containing 'dot dot slash' sequences that, when executed, will write arbitrary files on the target system.

Note: This vulnerability is known as "Zip-Slip".

Mitigation
Install update from vendor's website.

Vulnerable software versions

IBM WebSphere Application Server: 9.0 - 9.0.0.9, 8.5.5.0 - 8.5.5.14, 8.0.0.0 - 8.0.0.15, 7.0 - 7.0.0.45


External links
http://www-01.ibm.com/support/docview.wss?uid=ibm10730699


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability