IBM Sterling Secure Proxy 6.0.0.0, 6.0.0.1, 6.0.0.2, 6.0.0.3, and 6.1.0.0 could allow a remote attacker to traverse directories on the system. An attacker could send a specially crafted URL request containing "dot dot dot" sequences (/.../) to view arbitrary files on the system.
2024-11-15T16:15:34.240
2024-11-20T14:35:10.117
Analyzed
CVSSv3.1: 7.5 (HIGH)
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | ibm | sterling_secure_proxy | 6.0.0.0 | Yes |
Application | ibm | sterling_secure_proxy | 6.0.1.0 | Yes |
Application | ibm | sterling_secure_proxy | 6.0.2.0 | Yes |
Application | ibm | sterling_secure_proxy | 6.0.3.0 | Yes |
Application | ibm | sterling_secure_proxy | 6.1.0 | Yes |