First published: Thu Aug 07 2014(Updated: )
Directory traversal vulnerability in the Admin Center for Tivoli Storage Manager (TSM) in Rocket ServerGraph 1.2 allows remote attackers to (1) create arbitrary files via a .. (dot dot) in the query parameter in a writeDataFile action to the fileRequestor servlet, execute arbitrary files via a .. (dot dot) in the query parameter in a (2) run or (3) runClear action to the fileRequestor servlet, (4) read arbitrary files via a readDataFile action to the fileRequestor servlet, (5) execute arbitrary code via a save_server_groups action to the userRequest servlet, or (6) delete arbitrary files via a del action in the fileRequestServlet servlet.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Rocket Software Rocket Servergraph | =1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-3914 is classified as a high severity vulnerability due to the potential for remote code execution.
To fix CVE-2014-3914, it is recommended to apply the latest security patches from Rocket Software for Rocket ServerGraph 1.2.
The potential impacts of CVE-2014-3914 include unauthorized file creation and execution, leading to possible system compromise.
CVE-2014-3914 affects all installations of Rocket ServerGraph version 1.2 that have the Admin Center enabled.
The exploit method for CVE-2014-3914 involves utilizing directory traversal sequences in the query parameters of the fileRequestor servlet.