Vulnerability Name: | CVE-2015-7675 (CCN-110251) | ||||||||||||
Assigned: | 2015-10-02 | ||||||||||||
Published: | 2016-01-27 | ||||||||||||
Updated: | 2016-02-18 | ||||||||||||
Summary: | The "Send as attachment" feature in Ipswitch MOVEit DMZ before 8.2 and MOVEit Mobile before 1.2.2 allow remote authenticated users to bypass authorization and read uploaded files via a valid FileID in the (1) serverFileIds parameter to mobile/sendMsg or (2) arg01 parameter to human.aspx. | ||||||||||||
CVSS v3 Severity: | 6.5 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N) 5.7 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:U/RC:R)
3.8 Low (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:U/RC:R)
| ||||||||||||
CVSS v2 Severity: | 4.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:S/C:P/I:N/A:N)
| ||||||||||||
Vulnerability Type: | CWE-200 | ||||||||||||
Vulnerability Consequences: | Obtain Information | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2015-7675 Source: CONFIRM Type: Vendor Advisory http://docs.ipswitch.com/MOVEit/DMZ82/ReleaseNotes/MOVEitReleaseNotes82.pdf Source: MISC Type: Exploit http://packetstormsecurity.com/files/135457/Ipswitch-MOVEit-DMZ-8.1-Authorization-Bypass.html Source: CCN Type: Full-Disclosure Mailing List, Wed, 27 Jan 2016 14:43:24 +0100 Multiple security issues in MOVEit Managed File Transfer application Source: FULLDISC Type: UNKNOWN 20160127 Multiple security issues in MOVEit Managed File Transfer application Source: CCN Type: Ipswitch Web site Secure Managed File Transfer (MFT) Solutions | Ipswitch File Transfer Source: XF Type: UNKNOWN moveit-cve20157675-info-disc(110251) Source: CCN Type: Packet Storm Security [01-28-2016] Ipswitch MOVEit DMZ 8.1 Authorization Bypass Source: MISC Type: Exploit https://www.profundis-labs.com/advisories/CVE-2015-7675.txt | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||
BACK |