漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
漏洞
N/A
漏洞信息
This vulnerability allows remote attackers to overwrite arbitrary files on vulnerable installations of NetGain Systems Enterprise Manager 7.2.730 build 1034. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the org.apache.jsp.u.jsp.db.save_005fattrs_jsp servlet, which listens on TCP port 8081 by default. When parsing the id parameter, the process does not properly validate a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to overwrite any files accessible to the Administrator. Was ZDI-CAN-5196.
漏洞信息
N/A
漏洞
对路径名的限制不恰当(路径遍历)
漏洞
NetGain Enterprise Manager 路径遍历漏洞
漏洞信息
Netgain Enterprise Manager(EM)是新加坡网利系统(NetGain Systems)公司的一套IT资产监控管理软件。 NetGain Enterprise Manager 7.2.730 build 1034版本中的org.apache.jsp.u.jsp.db.save_005fattrs_jsp servlet存在目录遍历漏洞,该漏洞源于进程在执行文件操作之前,没有正确的验证用户提交的路径。远程攻击者可利用该漏洞覆盖管理员可访问的任意文件。
漏洞信息
N/A
漏洞
N/A