Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
N/A
Vulnerability Description
This vulnerability allows remote attackers to execute code by creating arbitrary files on vulnerable installations of NetGain Systems Enterprise Manager 7.2.730 build 1034. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the org.apache.jsp.u.jsp._3d.add_005f3d_005fview_005fdo_jsp servlet, which listens on TCP port 8081 by default. When parsing the filename parameter, the process does not properly validate a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code under the context of Administrator. Was ZDI-CAN-5197.
CVSS Information
N/A
Vulnerability Type
对路径名的限制不恰当(路径遍历)
Vulnerability Title
NetGain Enterprise Manager 路径遍历漏洞
Vulnerability Description
Netgain Enterprise Manager(EM)是新加坡网利系统(NetGain Systems)公司的一套IT资产监控管理软件。 NetGain Enterprise Manager 7.2.730 build 1034版本中的org.apache.jsp.u.jsp._3d.add_005f3d_005fview_005fdo_jsp servlet存在目录遍历漏洞,该漏洞源于进程在执行文件操作之前,没有正确的验证用户提交的路径。远程攻击者可利用该漏洞在管理员的上下文中执行任意代码。
CVSS Information
N/A
Vulnerability Type
N/A