Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-39187 | IBM Sterling Secure Proxy 6.0.0.0, 6.0.0.1, 6.0.0.2, 6.0.0.3, and 6.1.0.0 could allow a remote attacker to traverse directories on the system. An attacker could send a specially crafted URL request containing "dot dot dot" sequences (/.../) to view arbitrary files on the system. |
| Link | Providers |
|---|---|
| https://www.ibm.com/support/pages/node/7173631 |
|
Wed, 20 Nov 2024 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-22 | |
| CPEs | cpe:2.3:a:ibm:sterling_secure_proxy:6.1.0:*:*:*:*:*:*:* |
Fri, 15 Nov 2024 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 15 Nov 2024 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | IBM Sterling Secure Proxy 6.0.0.0, 6.0.0.1, 6.0.0.2, 6.0.0.3, and 6.1.0.0 could allow a remote attacker to traverse directories on the system. An attacker could send a specially crafted URL request containing "dot dot dot" sequences (/.../) to view arbitrary files on the system. | |
| Title | IBM Sterling Secure Proxy directory traversal | |
| First Time appeared |
Ibm
Ibm sterling Secure Proxy |
|
| Weaknesses | CWE-32 | |
| CPEs | cpe:2.3:a:ibm:sterling_secure_proxy:6.0.0.0:*:*:*:*:*:*:* cpe:2.3:a:ibm:sterling_secure_proxy:6.0.1.0:*:*:*:*:*:*:* cpe:2.3:a:ibm:sterling_secure_proxy:6.0.2.0:*:*:*:*:*:*:* cpe:2.3:a:ibm:sterling_secure_proxy:6.0.3.0:*:*:*:*:*:*:* cpe:2.3:a:ibm:sterling_secure_proxy:6.1.0.0:*:*:*:*:*:*:* |
|
| Vendors & Products |
Ibm
Ibm sterling Secure Proxy |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: ibm
Published:
Updated: 2024-11-15T16:09:35.664Z
Reserved: 2024-07-22T12:03:08.192Z
Link: CVE-2024-41784
Updated: 2024-11-15T16:09:30.163Z
Status : Analyzed
Published: 2024-11-15T16:15:34.240
Modified: 2024-11-20T14:35:10.117
Link: CVE-2024-41784
No data.
OpenCVE Enrichment
No data.
EUVD