Vulnerability identifier: #VU7300
Vulnerability risk: Low
CVSSv3.1: 3.8 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
CVE-ID:
CWE-ID:
CWE-22
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
NetIQ Sentinel
Server applications /
Remote management servers, RDP, SSH
Vendor: Novell
Description
The vulnerability allows a remote authenticated attacker to obtain potentially sensitive information.
The weakness exists in the ReportViewServlet servlet of Novell NetIQ Sentine due to path traversal. A remote attacker can use a PREVIEW value for the fileType field, conduct directory traversal attack and read arbitrary files on the system.
Successful exploitation of the vulnerability results in information disclosure.
Mitigation
Update to version 7.4.2.
Vulnerable software versions
NetIQ Sentinel: 7.4.0 - 7.4.1
External links
http://www.netiq.com/support/kb/doc.php?id=7017803
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.