First published: Wed Feb 10 2016(Updated: )
The "Send as attachment" feature in Ipswitch MOVEit DMZ before 8.2 and MOVEit Mobile before 1.2.2 allow remote authenticated users to bypass authorization and read uploaded files via a valid FileID in the (1) serverFileIds parameter to mobile/sendMsg or (2) arg01 parameter to human.aspx.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Ipswitch MOVEit DMZ | <=8.1 | |
Ipswitch MOVEit Mobile | <=1.2.0.962 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-7675 is considered a high severity vulnerability due to the potential for unauthorized file access.
To fix CVE-2015-7675, upgrade Ipswitch MOVEit DMZ to version 8.2 or later and MOVEit Mobile to version 1.2.2 or later.
The affected versions are Ipswitch MOVEit DMZ versions prior to 8.2 and MOVEit Mobile versions prior to 1.2.2.
An attacker can bypass authorization and access sensitive uploaded files if they have a valid FileID.
Remote authenticated users of Ipswitch MOVEit DMZ and MOVEit Mobile are impacted by CVE-2015-7675.