Description
Directory traversal vulnerability in SafeNet Sentinel Protection Server 7.0.0 through 7.4.0 and possibly earlier versions, and Sentinel Keys Server 1.0.3 and possibly earlier versions, allows remote attackers to read arbitrary files via a .. (dot dot) in the query string.
Exploits (2)
exploitdb
WORKING POC
VERIFIED
by Matt Schmidt · pythonwebappswindows
https://www.exploit-db.com/exploits/33428
exploitdb
WORKING POC
VERIFIED
by Corey Lebleu · textremotewindows
https://www.exploit-db.com/exploits/30809
References (10)
Core 10
Core References
Various Sources x_refsource_misc
https://ics-cert.us-cert.gov/advisories/ICSA-15-272-01
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/38636
Third Party Advisory, VDB Entry mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/484224/100/200/threaded
Various Sources x_refsource_confirm
http://safenet-inc.com/support/files/SPI740SecurityPatch.zip
Third Party Advisory third-party-advisory
x_refsource_sreason
http://securityreason.com/securityalert/3471
Exploit, Patch vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/26583
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/27811
Third Party Advisory vdb-entry
x_refsource_vupen
http://www.vupen.com/english/advisories/2007/4011
Third Party Advisory, VDB Entry mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/484201/100/200/threaded
Exploit vdb-entry
x_refsource_sectrack
http://www.securitytracker.com/id?1018992
Scores
EPSS
0.3335
EPSS Percentile
96.9%
Details
CWE
CWE-22
Status
published
Products (6)
safenet/sentinel_keys_server
1.0.3
safenet/sentinel_protection_server
7.0
safenet/sentinel_protection_server
7.1
safenet/sentinel_protection_server
7.2
safenet/sentinel_protection_server
7.3
safenet/sentinel_protection_server
7.4
Published
Dec 20, 2007
Tracked Since
Feb 18, 2026