Vulnerability Details : CVE-2017-15550
An issue was discovered in EMC Avamar Server 7.1.x, 7.2.x, 7.3.x, 7.4.x, 7.5.0; EMC NetWorker Virtual Edition (NVE) 9.0.x, 9.1.x, 9.2.x; and EMC Integrated Data Protection Appliance 2.0. A remote authenticated malicious user with low privileges could access arbitrary files on the server file system in the context of the running vulnerable application via Path traversal.
Vulnerability category: Directory traversal
Products affected by CVE-2017-15550
- cpe:2.3:a:emc:networker:9.2:*:*:*:virtual:*:*:*
- cpe:2.3:a:emc:networker:9.1:*:*:*:virtual:*:*:*
- cpe:2.3:a:emc:networker:9.0:*:*:*:virtual:*:*:*
- cpe:2.3:a:emc:avamar_server:7.3-226:*:*:*:*:*:*:*
- cpe:2.3:a:emc:avamar_server:7.3-233:*:*:*:*:*:*:*
- cpe:2.3:a:emc:avamar_server:7.3-125:sp1:*:*:*:*:*:*
- cpe:2.3:a:emc:avamar_server:7.2-309:*:*:*:*:*:*:*
- cpe:2.3:a:emc:avamar_server:7.4-242:*:*:*:*:*:*:*
- cpe:2.3:a:emc:avamar_server:7.3-211:*:*:*:*:*:*:*
- cpe:2.3:a:emc:avamar_server:7.2-401:*:*:*:*:*:*:*
- cpe:2.3:a:emc:avamar_server:7.1-302:*:*:*:*:*:*:*
- cpe:2.3:a:emc:avamar_server:7.1-145:sp1:*:*:*:*:*:*
- cpe:2.3:a:emc:avamar_server:7.1-21:sp2:*:*:*:*:*:*
- cpe:2.3:a:emc:avamar_server:7.5-183:*:*:*:*:*:*:*
- cpe:2.3:a:emc:avamar_server:7.4-58:sp1:*:*:*:*:*:*
- cpe:2.3:a:emc:avamar_server:7.2-32:sp1:*:*:*:*:*:*
- cpe:2.3:a:emc:avamar_server:7.1-370:*:*:*:*:*:*:*
- cpe:2.3:a:emc:integrated_data_protection_appliance:2.0:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2017-15550
0.31%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 69 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2017-15550
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.0
|
HIGH | AV:N/AC:L/Au:S/C:C/I:C/A:C |
8.0
|
10.0
|
NIST | |
8.8
|
HIGH | CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
NIST |
CWE ids for CVE-2017-15550
-
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.Assigned by: nvd@nist.gov (Primary)
References for CVE-2017-15550
-
http://seclists.org/fulldisclosure/2018/Jan/17
Full Disclosure: ESA-2018-001: EMC Avamar Server, NetWorker Virtual Edition and Integrated Data Protection Appliance Multiple Security VulnerabilitiesIssue Tracking;Mailing List;Third Party Advisory
-
http://www.securityfocus.com/bid/102358
VMware vSphere Data Protection CVE-2017-15550 Directory Traversal VulnerabilityThird Party Advisory;VDB Entry
-
http://www.securitytracker.com/id/1040070
VMware vSphere Data Protection (VDP) Bugs Let Remote Users Gain Root Access and Remote Authenticated Users Upload and Download Files - SecurityTrackerThird Party Advisory;VDB Entry
Jump to