First published: Mon Aug 21 2017(Updated: )
A Path Traversal (CWE-22) vulnerability in esfadmingui in Micro Focus Enterprise Developer and Enterprise Server 2.3, 2.3 Update 1 before Hotfix 8, and 2.3 Update 2 before Hotfix 9 allows remote authenticated users to download arbitrary files from a system running the product, if this component is configured. Note esfadmingui is not enabled by default.
Credit: meissner@suse.de
Affected Software | Affected Version | How to fix |
---|---|---|
Microfocus Enterprise Developer | =2.3 | |
Microfocus Enterprise Developer | =2.3-update1 | |
Microfocus Enterprise Developer | =2.3-update2 | |
Microfocus Enterprise Server | =2.3 | |
Microfocus Enterprise Server | =2.3-update1 | |
Microfocus Enterprise Server | =2.3-update2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-7424 is classified as a high severity vulnerability due to its potential for remote exploitation by authenticated users.
To fix CVE-2017-7424, users should apply Hotfix 8 for version 2.3, or Hotfix 9 for version 2.3 Update 2 of Micro Focus Enterprise Developer and Enterprise Server.
CVE-2017-7424 affects users of Micro Focus Enterprise Developer and Enterprise Server versions 2.3, including Update 1 and Update 2 before specific hotfixes are applied.
CVE-2017-7424 is a Path Traversal vulnerability allowing remote authenticated users to download arbitrary files.
No, CVE-2017-7424 requires the attacker to be an authenticated user to exploit the vulnerability.