CVE-2016-1183
19.06.2016, 01:59
NTT Data TERASOLUNA Server Framework for Java(WEB) 2.0.0.1 through 2.0.6.1, as used in Fujitsu Interstage Business Application Server and other products, allows remote attackers to bypass a file-extension protection mechanism, and consequently read arbitrary files, via a crafted pathname.Enginsight
Vendor | Product | Version |
---|---|---|
nttdata | terasoluna_server_framework_for_java_web | 2.0.0.1 |
nttdata | terasoluna_server_framework_for_java_web | 2.0.0.2 |
nttdata | terasoluna_server_framework_for_java_web | 2.0.1.0 |
nttdata | terasoluna_server_framework_for_java_web | 2.0.2.0 |
nttdata | terasoluna_server_framework_for_java_web | 2.0.5.1 |
nttdata | terasoluna_server_framework_for_java_web | 2.0.5.2 |
nttdata | terasoluna_server_framework_for_java_web | 2.0.5.3 |
nttdata | terasoluna_server_framework_for_java_web | 2.0.6.1 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
References