0day.today - Biggest Exploit Database in the World.
Things you should know about 0day.today:
Administration of this site uses the official contacts. Beware of impostors!
- We use one main domain: http://0day.today
- Most of the materials is completely FREE
- If you want to purchase the exploit / get V.I.P. access or pay for any other service,
you need to buy or earn GOLD
Administration of this site uses the official contacts. Beware of impostors!
We DO NOT use Telegram or any messengers / social networks!
Please, beware of scammers!
Please, beware of scammers!
- Read the [ agreement ]
- Read the [ Submit ] rules
- Visit the [ faq ] page
- [ Register ] profile
- Get [ GOLD ]
- If you want to [ sell ]
- If you want to [ buy ]
- If you lost [ Account ]
- Any questions [ admin@0day.today ]
- Authorisation page
- Registration page
- Restore account page
- FAQ page
- Contacts page
- Publishing rules
- Agreement page
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
You can contact us by:
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
Gigamon GigaVUE 5.5.01.11 Directory Traversal / File Upload Vulnerabilities
Author
Risk
[
Security Risk High
]0day-ID
Category
Date add
CVE
Platform
Gigamon GigaVUE 5.5.01.11 Directory Traversal / File Upload Vulnerabilities An issue was discovered in Gigamon GigaVUE 5.5.01.11. The upload functionality allows an authenticated user to change the filename value (in the POST method) from the original filename to achieve directory traversal via a ../ sequence and, for example, obtain a complete directory listing of the machine. ------------------------------------------ [Additional Information] This vulnerability aid the attacker in discovering the whole file system in the underlying host system - including identifying the writeable and read-only file systems. The authenticated user needs to use the upload functionality. The POST HTTP verb is being used which needs to be intercepted, and modified (the "filename" parameter must be manipulated in the POST body section) These vulnerabilities were reported to the vendor. They said this version will be decommissioned in 2023 and they decided not to provide technical support anymore. In other words, they will not fix any IT Security Issues which have lower than critical risk. This version is in production in enterprise environments, and will be available until end of 2023, so the impact is real. ------------------------------------------ [Vulnerability Type] Directory Traversal ------------------------------------------ [Vendor of Product] Gigamon ------------------------------------------ [Affected Product Code Base] GigaVUE - 5.5.01.11 ------------------------------------------ [Affected Component] Upload functionality ------------------------------------------ [Attack Type] Remote ------------------------------------------ [Impact Information Disclosure] true ------------------------------------------ [Attack Vectors] The authenticated user needs to use the upload functionality. The POST HTTP verb is being used which needs to be intercepted, and modified (the "filename" parameter must be manipulated in the POST body section) ------------------------------------------ [Reference]https://www.gigamon.com/products/access-traffic/physical-nodes.html ------------------------------------------ [Has vendor confirmed or acknowledged the vulnerability?] true ------------------------------------------ [Discoverer] Balazs Hambalko, IT Security Consultant Use CVE-2020-12251. An issue was discovered in Gigamon GigaVUE 5.5.01.11. The upload functionality allows an arbitrary file upload for an authenticated user. If an executable file is uploaded into the www-root directory, then it could yield remote code execution via the filename parameter. ------------------------------------------ [Additional Information] These vulnerabilities were reported to the vendor. They said this version will be decommissioned in 2023 and they decided not to provide technical support anymore. In other words, they will not fix any IT Security Issues which have lower than critical risk. This version is in production in enterprise environments, and will be available until end of 2023, so the impact is real. ------------------------------------------ [Vulnerability Type] Insecure Permissions ------------------------------------------ [Vendor of Product] Gigamon ------------------------------------------ [Affected Product Code Base] GigaVUE - 5.5.01.11 ------------------------------------------ [Affected Component] Upload functionality ------------------------------------------ [Attack Type] Remote ------------------------------------------ [Impact Code execution] true ------------------------------------------ [Attack Vectors] The authenticated user needs to use the upload functionality. The POST HTTP verb is being used which needs to be intercepted, and modified (the "filename" parameter must be manipulated in the POST body section) ------------------------------------------ [Reference]https://www.gigamon.com/products/access-traffic/physical-nodes.html ------------------------------------------ [Has vendor confirmed or acknowledged the vulnerability?] true ------------------------------------------ [Discoverer] Balazs Hambalko, IT Security Consultant Use CVE-2020-12252. # 0day.today [2024-10-06] #