First published: Fri Apr 22 2016(Updated: )
Directory traversal vulnerability in the import users feature in Micro Focus Novell Service Desk before 7.2 allows remote authenticated administrators to upload and execute arbitrary JSP files via a .. (dot dot) in a filename within a multipart/form-data POST request to a LiveTime.woa URL.
Credit: meissner@suse.de
Affected Software | Affected Version | How to fix |
---|---|---|
Novell Service Desk | <=7.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-1593 has a medium severity rating due to its potential for arbitrary file upload and execution.
To fix CVE-2016-1593, upgrade Micro Focus Novell Service Desk to version 7.2 or later to eliminate the vulnerability.
CVE-2016-1593 is classified as a directory traversal vulnerability impacting the file upload feature.
CVE-2016-1593 affects remote authenticated administrators using Micro Focus Novell Service Desk versions prior to 7.2.
CVE-2016-1593 allows attackers to exploit directory traversal through a multipart/form-data POST request.