First published: Wed Feb 13 2008(Updated: )
Directory traversal vulnerability in SafeNet Sentinel Protection Server 7.4.1.0 and earlier, and Sentinel Keys Server 1.0.4.0 and earlier, allows remote attackers to read arbitrary files via a ..\ (dot dot backslash) in the URI. NOTE: this issue reportedly exists because of an incomplete fix for CVE-2007-6483.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Thales Sentinel Protection Installer | <=7.4.1 | |
SafeNet Sentinel Keys Server | <=1.0.4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-0760 is classified as a medium severity vulnerability.
To fix CVE-2008-0760, upgrade SafeNet Sentinel Protection Server to version 7.4.1.1 or later and Sentinel Keys Server to version 1.0.4.1 or later.
CVE-2008-0760 affects SafeNet Sentinel Protection Server versions 7.4.1.0 and earlier, and Sentinel Keys Server versions 1.0.4.0 and earlier.
CVE-2008-0760 is a directory traversal vulnerability that allows attackers to read arbitrary files.
Yes, CVE-2008-0760 can be exploited remotely by attackers using a specially crafted URI.