AbstractA path traversal vulnerability was found in EMCM&R(Watch4net)DeviceDiscovery. This vulnerability allows an attacker toaccess sensitive files containing configuration data, passwords, database records, log data, source code, and program scripts and binaries.
Affected products
EMC reports that the following products are affected by this vulnerability:-EMCM&R(Watch4Net) versions prior 6.5u1
-EMCViPRSRM versions prior to3.6.1See also
-CVE-2015-0516-ESA-2015-004:EMCM&R(Watch4Net)MultipleVulnerabilities-ESA-2015-004:EMCM&R(Watch4Net)MultipleVulnerabilities(login required)FixEMC released the following updated versions that resolve this vulnerability:-EMCM&R(Watch4Net)6.5u1
-EMCViPRSRM3.6.1Registered customers can download upgraded software from support.emc.com at https://support.emc.com/downloads/34247_ViPR-SRM.
IntroductionEMCM&R(formerly known as Watch4net) enables cross-domain performance monitoring of infrastructure and data center components in real-time - from a single, customizable dashboard.
A path traversal vulnerability was found in M&R(Watch4net)DeviceDiscovery. Path traversal vulnerabilities arise when user-controllable data is used insecurely within a file system operation. Typically, a user-supplied filename is appended toa directory prefix in order toread or write the contents of a file.
DetailsThis vulnerability can be trigger via de fileFileName URL parameter of the /device-discovery/devicesource/downloadSeedFile page. An authenticated attacker can supply path traversal sequences tobreak out of the intended download directory and read files elsewhere on the file system. This allows the attacker toaccess sensitive files containing configuration data, passwords, database records, log data, source code, and program scripts and binaries.
The following URL can be used todemonstratethis issue:
http://<target>:58080/device-discovery/devicesource/downloadSeedFile?fileFileName=..\..\..\..\..\..\..\..\..\..\..\..\..\..\..\..\windows\System32\drivers\etc\hosts