IBM Sterling Secure Proxy 6.0.0.0, 6.0.0.1, 6.0.0.2, 6.0.0.3, and 6.1.0.0 could allow a remote attacker to traverse directories on the system. An attacker could send a specially crafted URL request containing "dot dot dot" sequences (/.../) to view arbitrary files on the system.
                
            Metrics
Affected Vendors & Products
References
        | Link | Providers | 
|---|---|
| https://www.ibm.com/support/pages/node/7173631 |     | 
History
                    Wed, 20 Nov 2024 15:00:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Weaknesses | CWE-22 | |
| CPEs | cpe:2.3:a:ibm:sterling_secure_proxy:6.1.0:*:*:*:*:*:*:* | 
Fri, 15 Nov 2024 16:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | ssvc 
 | 
Fri, 15 Nov 2024 16:00:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | IBM Sterling Secure Proxy 6.0.0.0, 6.0.0.1, 6.0.0.2, 6.0.0.3, and 6.1.0.0 could allow a remote attacker to traverse directories on the system. An attacker could send a specially crafted URL request containing "dot dot dot" sequences (/.../) to view arbitrary files on the system. | |
| Title | IBM Sterling Secure Proxy directory traversal | |
| First Time appeared | Ibm Ibm sterling Secure Proxy | |
| Weaknesses | CWE-32 | |
| CPEs | cpe:2.3:a:ibm:sterling_secure_proxy:6.0.0.0:*:*:*:*:*:*:* cpe:2.3:a:ibm:sterling_secure_proxy:6.0.1.0:*:*:*:*:*:*:* cpe:2.3:a:ibm:sterling_secure_proxy:6.0.2.0:*:*:*:*:*:*:* cpe:2.3:a:ibm:sterling_secure_proxy:6.0.3.0:*:*:*:*:*:*:* cpe:2.3:a:ibm:sterling_secure_proxy:6.1.0.0:*:*:*:*:*:*:* | |
| Vendors & Products | Ibm Ibm sterling Secure Proxy | |
| References |  | |
| Metrics | cvssV3_1 
 | 
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: ibm
Published: 2024-11-15T15:40:57.009Z
Updated: 2024-11-15T16:09:35.664Z
Reserved: 2024-07-22T12:03:08.192Z
Link: CVE-2024-41784
 Vulnrichment
                        Vulnrichment
                    Updated: 2024-11-15T16:09:30.163Z
 NVD
                        NVD
                    Status : Analyzed
Published: 2024-11-15T16:15:34.240
Modified: 2024-11-20T14:35:10.117
Link: CVE-2024-41784
 Redhat
                        Redhat
                    No data.
 ReportizFlow
ReportizFlow