First published: Tue Jul 01 2014(Updated: )
stconf.nsf in IBM Sametime Meeting Server 8.5.1 relies on the client to validate the file format used in wAttach?OpenForm multipart/form-data POST requests, which allows remote authenticated users to bypass intended upload restrictions by modifying the Content-Type header and file extension, as demonstrated by replacing a text/plain .txt upload with an application/octet-stream .exe upload.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Sametime Meeting Server | =8.5.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-3088 has a medium severity rating due to the potential for remote authenticated users to bypass file upload restrictions.
To fix CVE-2014-3088, ensure that file format validation is properly implemented on the server side, regardless of client inputs.
CVE-2014-3088 affects IBM Sametime Meeting Server version 8.5.1.
Yes, CVE-2014-3088 can lead to arbitrary file upload due to improper validation of the file format.
Yes, CVE-2014-3088 is exploitable remotely by authenticated users through crafted multipart/form-data POST requests.