First published: Fri Oct 25 2019(Updated: )
IBM Cloud Orchestrator could allow a remote attacker to traverse directories on the system. An attacker could send a specially-crafted URL request containing "dot dot" sequences (/../) to view arbitrary files on the system.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Cloud Orchestrator Enterprise | >=2.4.0.0<=2.4.0.5 | |
IBM Cloud Orchestrator Enterprise | >=2.4.0.0<=2.4.0.5 | |
IBM Cloud Orchestrator Enterprise | >=2.5.0.0<=2.5.0.9 | |
IBM Cloud Orchestrator Enterprise | >=2.5.0.0<=2.5.0.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2019-4400 is classified as high due to its ability to allow unauthorized file access through directory traversal.
To fix CVE-2019-4400, upgrade IBM Cloud Orchestrator to version 2.4.0.6 or 2.5.0.10 or later.
CVE-2019-4400 affects IBM Cloud Orchestrator versions 2.4 through 2.4.0.5 and 2.5 through 2.5.0.9.
CVE-2019-4400 enables remote attackers to conduct directory traversal attacks to access arbitrary files.
Yes, CVE-2019-4400 can significantly affect system security by allowing unauthorized access to sensitive files.