Vulnerability Details : CVE-2015-6852
Directory traversal vulnerability in the API in EMC Secure Remote Services Virtual Edition 3.x before 3.10 allows remote authenticated users to read log files via a crafted parameter.
Vulnerability category: Directory traversalInformation leak
Exploit prediction scoring system (EPSS) score for CVE-2015-6852
Probability of exploitation activity in the next 30 days: 0.16%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 52 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2015-6852
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
4.0
|
MEDIUM | AV:N/AC:L/Au:S/C:P/I:N/A:N |
8.0
|
2.9
|
NIST |
4.3
|
MEDIUM | CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N |
2.8
|
1.4
|
NIST |
CWE ids for CVE-2015-6852
-
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.Assigned by: nvd@nist.gov (Primary)
References for CVE-2015-6852
-
http://www.securitytracker.com/id/1034530
EMC Secure Remote Services Virtual Edition Directory Traversal Flaw Lets Remote Authenticated Users View Files on the Target System - SecurityTracker
-
http://seclists.org/bugtraq/2015/Dec/130
Bugtraq: ESA-2015-179: EMC Secure Remote Services Virtual Edition Path Traversal Vulnerability
-
http://packetstormsecurity.com/files/135044/EMC-Secure-Remote-Services-Virtual-Edition-Path-Traversal.html
EMC Secure Remote Services Virtual Edition Path Traversal ≈ Packet Storm
-
http://www.securityfocus.com/bid/79661
EMC Secure Remote Services Virtual Edition CVE-2015-6852 Directory Traversal Vulnerability
Products affected by CVE-2015-6852
- cpe:2.3:a:emc:secure_remote_services:3.03:*:*:*:virtual:*:*:*
- cpe:2.3:a:emc:secure_remote_services:3.02:*:*:*:virtual:*:*:*
- cpe:2.3:a:emc:secure_remote_services:3.0:*:*:*:virtual:*:*:*