Vulnerability Name:

CVE-2016-1610 (CCN-115520)

Assigned:2016-07-25
Published:2016-07-25
Updated:2017-09-03
Summary:Directory traversal vulnerability in the email-template feature in Novell Filr before 1.2 Security Update 3 and 2.0 before Security Update 2 allows remote attackers to bypass intended access restrictions and write to arbitrary files via a .. (dot dot) in a blob name.
CVSS v3 Severity:7.5 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N)
6.5 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): High
Availibility (A): None
5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
4.6 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): Low
Availibility (A): None
CVSS v2 Severity:5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
Vulnerability Type:CWE-22
Vulnerability Consequences:Bypass Security
References:Source: MITRE
Type: CNA
CVE-2016-1610

Source: BUGTRAQ
Type: Third Party Advisory
20160725 SEC Consult SA-20160725-0 :: Multiple vulnerabilities in Micro Focus (Novell) Filr

Source: CCN
Type: Full-Disclosure Mailing List, Mon, 25 Jul 2016 11:02:40 +0200
SEC Consult SA-20160725-0 :: Multiple vulnerabilities in Micro Focus (Novell) Filr

Source: BID
Type: UNKNOWN
92113

Source: CCN
Type: BID-92113
Novell Filr Multiple Security Vulnerabilities

Source: CONFIRM
Type: Product
https://download.novell.com/Download?buildid=3V-3ArYN85I~

Source: CONFIRM
Type: Product
https://download.novell.com/Download?buildid=BOTiHcBFfv0~

Source: XF
Type: UNKNOWN
filr-cve20161610-sec-bypass(115520)

Source: CCN
Type: Packet Storm Security [07-25-2016]
Micro Focus Filr CSRF / XSS / Code Execution

Source: EXPLOIT-DB
Type: EXPLOIT
Offensive Security Exploit Database [07-25-2016]

Source: EXPLOIT-DB
Type: UNKNOWN
40161

Source: CCN
Type: Novell Web site
Micro Focus Filr

Source: CONFIRM
Type: Patch, Vendor Advisory
https://www.novell.com/support/kb/doc.php?id=7017788

Vulnerable Configuration:Configuration 1:
  • cpe:/a:novell:filr:*:security_update_2:*:*:*:*:*:* (Version <= 1.2)
  • OR cpe:/a:novell:filr:*:security_update_1:*:*:*:*:*:* (Version <= 2.0)

  • * Denotes that component is vulnerable
    BACK
    novell filr * security_update_2
    novell filr * security_update_1