Description
Directory traversal vulnerability in the email-template feature in Novell Filr before 1.2 Security Update 3 and 2.0 before Security Update 2 allows remote attackers to bypass intended access restrictions and write to arbitrary files via a .. (dot dot) in a blob name.
Exploits (1)
exploitdb
WRITEUP
VERIFIED
by SEC Consult · textwebappsjava
https://www.exploit-db.com/exploits/40161
References (6)
Core 6
Core References
Mailing List mailing-list
x_refsource_bugtraq
http://seclists.org/bugtraq/2016/Jul/119
Various Sources x_refsource_confirm
https://download.novell.com/Download?buildid=3V-3ArYN85I~
Exploit, Third Party Advisory exploit
x_refsource_exploit-db
https://www.exploit-db.com/exploits/40161/
Vendor Advisory x_refsource_confirm
https://www.novell.com/support/kb/doc.php?id=7017788
Various Sources x_refsource_confirm
https://download.novell.com/Download?buildid=BOTiHcBFfv0~
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/92113
Scores
CVSS v3
7.5
EPSS
0.2078
EPSS Percentile
95.6%
Attack Vector
NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Details
CWE
CWE-22
Status
published
Products (2)
novell/filr
< 1.2
novell/filr
< 2.0
Published
Aug 01, 2016
Tracked Since
Feb 18, 2026