Home    |    View Topics    |    Search    |    Contact Us    |   



Category:   Application (Generic)  >   WhatsUp Vendors:   Ipswitch
Ipswitch WhatsUp TFTP Server Input Validation Flaw Lets Remote Users Traverse the Directory
SecurityTracker Alert ID:  1026368
SecurityTracker URL:
CVE Reference:   CVE-2011-4722   (Links to External Site)
Updated:  Jan 2 2015
Original Entry Date:  Dec 3 2011
Impact:   Disclosure of system information, Disclosure of user information
Exploit Included:  Yes  

Description:   A vulnerability was reported in IPSwitch WhatsUp. A remote user can view files on the target system.

The TFTP server does not properly validate user-supplied input. A remote user can supply a specially crafted request containing '../' characters to view files on target system that are located outside of the document directory.

Systems running the TFTP server version (and possibly other versions) are affected.

The original advisory is available at:

Prabhu S Angadi from SecPod Technologies reported this vulnerability.

Impact:   A remote user can view files on the target system.
Solution:   No solution was available at the time of this entry.
Vendor URL: (Links to External Site)
Cause:   Input validation error
Underlying OS:  Windows (Any)

Message History:   None.

 Source Message Contents

[Original Message Not Available for Viewing]

Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, LLC