Multiple directory traversal vulnerabilities in Algo Risk Application (ARA) 2.4.0.1 through 4.9.1 in IBM Algo One allow remote authenticated users to bypass intended access restrictions via a crafted pathname for a (1) configuration or (2) JAR file.
2014-03-06T11:55:05.007
2025-04-12T10:46:40.837
Deferred
CVSSv2: 4.0 (MEDIUM)
AV:N/AC:L/Au:S/C:P/I:N/A:N
8.0
2.9
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | ibm | algo_one | 4.9.1 | Yes |
Application | ibm | algo_risk_application | 2.4.0.1 | Yes |
Application | ibm | algo_risk_application | 2.4.1 | Yes |
Application | ibm | algo_risk_application | 2.4.2 | Yes |
Application | ibm | algo_risk_application | 2.5.0 | Yes |
Application | ibm | algo_risk_application | 2.5.1 | Yes |
Application | ibm | algo_risk_application | 2.5.2 | Yes |
Application | ibm | algo_risk_application | 2.5.3 | Yes |
Application | ibm | algo_risk_application | 2.5.4 | Yes |
Application | ibm | algo_risk_application | 2.5.5 | Yes |
Application | ibm | algo_risk_application | 2.5.5.2 | Yes |
Application | ibm | algo_risk_application | 2.5.6 | Yes |
Application | ibm | algo_risk_application | 2.5.7.1 | Yes |
Application | ibm | algo_risk_application | 2.5.7.2 | Yes |
Application | ibm | algo_risk_application | 2.5.8 | Yes |
Application | ibm | algo_risk_application | 4.5.1 | Yes |
Application | ibm | algo_risk_application | 4.5.2 | Yes |
Application | ibm | algo_risk_application | 4.5.3 | Yes |
Application | ibm | algo_risk_application | 4.5.4 | Yes |
Application | ibm | algo_risk_application | 4.6.0 | Yes |
Application | ibm | algo_risk_application | 4.6.1 | Yes |
Application | ibm | algo_risk_application | 4.7.0 | Yes |
Application | ibm | algo_risk_application | 4.7.1 | Yes |
Application | ibm | algo_risk_application | 4.8.0 | Yes |
Application | ibm | algo_risk_application | 4.9.0 | Yes |
Application | ibm | algo_risk_application | 4.9.1 | Yes |