#VU7300 Information disclosure in NetIQ Sentinel


Published: 2017-07-04

Vulnerability identifier: #VU7300

Vulnerability risk: Low

CVSSv3.1: 3.8 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2016-1605

CWE-ID: CWE-22

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
NetIQ Sentinel
Server applications / Remote management servers, RDP, SSH

Vendor: Novell

Description
The vulnerability allows a remote authenticated attacker to obtain potentially sensitive information.

The weakness exists in the ReportViewServlet servlet of Novell NetIQ Sentine due to path traversal. A remote attacker can use a PREVIEW value for the fileType field, conduct directory traversal attack and read arbitrary files on the system.

Successful exploitation of the vulnerability results in information disclosure.

Mitigation
Update to version 7.4.2.

Vulnerable software versions

NetIQ Sentinel: 7.4.0 - 7.4.1


External links
http://www.netiq.com/support/kb/doc.php?id=7017803


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability