First published: Thu Mar 06 2014(Updated: )
Directory traversal vulnerability in download.php in the Passive Capture Application (PCA) web console in IBM Tealeaf CX 7.x, 8.x through 8.6, 8.7 before FP2, and 8.8 before FP2 allows remote authenticated users to bypass intended access restrictions via a .. (dot dot) in the log parameter, as demonstrated using a crafted request for a customer-support file, as demonstrated by a log file.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Tealeaf Customer Experience | =7.1 | |
IBM Tealeaf Customer Experience | =7.2 | |
IBM Tealeaf Customer Experience | =8.0 | |
IBM Tealeaf Customer Experience | =8.1 | |
IBM Tealeaf Customer Experience | =8.2 | |
IBM Tealeaf Customer Experience | =8.3 | |
IBM Tealeaf Customer Experience | =8.4 | |
IBM Tealeaf Customer Experience | =8.5 | |
IBM Tealeaf Customer Experience | =8.6 | |
IBM Tealeaf Customer Experience | =8.7 | |
IBM Tealeaf Customer Experience | =8.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2013-6720 is classified as medium, as it allows remote authenticated users to bypass access restrictions.
CVE-2013-6720 affects IBM Tealeaf CX versions 7.1 through 8.6, 8.7 before FP2, and 8.8 before FP2.
To fix CVE-2013-6720, upgrade to IBM Tealeaf CX version 8.7 FP2 or later.
CVE-2013-6720 is a directory traversal vulnerability that can be exploited through the log parameter.
CVE-2013-6720 can be exploited by remote authenticated users who have access to the affected application.