CVE-2014-3088
stconf.nsf in IBM Sametime Meeting Server 8.5.1 relies on the client to validate the file format used in wAttach?OpenForm multipart/form-data POST requests, which allows remote authenticated users to bypass intended upload restrictions by modifying the Content-Type header and file extension, as demonstrated by replacing a text/plain .txt upload with an application/octet-stream .exe upload.
Ver en NVDSeveridad
N/A
EPSS
Afecta
ibm:sametime_meeting_serverDescripción técnica
stconf.nsf in IBM Sametime Meeting Server 8.5.1 relies on the client to validate the file format used in wAttach?OpenForm multipart/form-data POST requests, which allows remote authenticated users to bypass intended upload restrictions by modifying the Content-Type header and file extension, as demonstrated by replacing a text/plain .txt upload with an application/octet-stream .exe upload.
Referencias
- http://linux.oracle.com/errata/ELSA-2014-0747.html
- http://packetstormsecurity.com/files/127294
- http://packetstormsecurity.com/files/127829/IBM-Sametime-Meet-Server-8.5-Arbitrary-File-Upload.html
- http://www.securityfocus.com/bid/68291
- http://linux.oracle.com/errata/ELSA-2014-0747.html
- http://packetstormsecurity.com/files/127294
- http://packetstormsecurity.com/files/127829/IBM-Sametime-Meet-Server-8.5-Arbitrary-File-Upload.html
- http://www.securityfocus.com/bid/68291