First published: Mon Jan 23 2017(Updated: )
Directory traversal vulnerability in the file download functionality in ZOHO WebNMS Framework 5.2 and 5.2 SP1 allows remote attackers to read arbitrary files via a .. (dot dot) in the fileName parameter to servlets/FetchFile.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Zohocorp Webnms Framework | =5.2 | |
Zohocorp Webnms Framework | =5.2-sp1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-6601 has a medium severity rating due to its potential to allow attackers to access sensitive files.
To mitigate CVE-2016-6601, ensure you update to ZOHO WebNMS Framework version 5.2 SP2 or later.
CVE-2016-6601 is a directory traversal vulnerability affecting the file download functionality.
Yes, CVE-2016-6601 can potentially lead to data breaches by allowing unauthorized file access.
CVE-2016-6601 affects ZOHO WebNMS Framework versions 5.2 and 5.2 SP1.