First published: Wed Jan 09 2019(Updated: )
Directory traversal vulnerability in Cybozu Remote Service 3.0.0 to 3.1.8 allows remote attackers to execute Java code file on the server via unspecified vectors.
Credit: vultures@jpcert.or.jp
Affected Software | Affected Version | How to fix |
---|---|---|
Cybozu Remote Service Manager | >=3.0.0<=3.1.8 | |
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-16171 is a directory traversal vulnerability in Cybozu Remote Service 3.0.0 to 3.1.8, which allows remote attackers to execute Java code files on the server.
The directory traversal vulnerability in Cybozu Remote Service 3.0.0 to 3.1.8 occurs due to insufficient input validation, allowing remote attackers to manipulate file paths and access files outside the intended directory.
CVE-2018-16171 has a severity rating of 8.8 (high).
To fix the vulnerability, update Cybozu Remote Service to version 3.2.0 or later, which contains the necessary fixes and patches to address the directory traversal vulnerability.
You can find more information about CVE-2018-16171 on the JVN website (https://jvn.jp/en/jp/JVN23161885/index.html) and the Cybozu Support Knowledge Base (https://kb.cybozu.support/article/35259/).