First published: Fri May 03 2013(Updated: )
The web-based file-restore interface in EMC Avamar Server before 6.1.0 allows remote authenticated users to read arbitrary files via a crafted URL.
Credit: security_alert@emc.com
Affected Software | Affected Version | How to fix |
---|---|---|
EMC Avamar Virtual Edition | =5.0 | |
EMC Avamar Virtual Edition | =5.0-sp1 | |
EMC Avamar Virtual Edition | =5.0-sp2 | |
EMC Avamar Virtual Edition | =5.0.0-407 | |
EMC Avamar Virtual Edition | =5.0.4-26 | |
EMC Avamar Virtual Edition | =6.0 | |
EMC Avamar Virtual Edition | =6.0.1 | |
EMC Avamar Virtual Edition | =6.0.2 | |
EMC Avamar Virtual Edition | =6.0.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-0944 has a medium severity rating, indicating it could lead to unauthorized file access by remote authenticated users.
To address CVE-2013-0944, upgrade EMC Avamar Server to version 6.1.0 or later.
CVE-2013-0944 affects multiple versions of EMC Avamar Server, including 5.0, 5.0 SP1, 5.0 SP2, and 6.0 versions.
CVE-2013-0944 can be exploited by remote authenticated users who have access to the web-based file-restore interface.
CVE-2013-0944 allows remote authenticated users to read arbitrary files on the server through crafted URLs.