CVE-2007-6483
Summary
| CVE | CVE-2007-6483 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2007-12-20 20:46:00 UTC |
| Updated | 2018-10-15 21:54:00 UTC |
| Description | Directory traversal vulnerability in SafeNet Sentinel Protection Server 7.0.0 through 7.4.0 and possibly earlier versions, and Sentinel Keys Server 1.0.3 and possibly earlier versions, allows remote attackers to read arbitrary files via a .. (dot dot) in the query string. |
Risk And Classification
Problem Types: CWE-22
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Safenet | Sentinel Keys Server | 1.0.3 | All | All | All |
| Application | Safenet | Sentinel Keys Server | 1.0.3 | All | All | All |
| Application | Safenet | Sentinel Protection Server | 7.0 | All | All | All |
| Application | Safenet | Sentinel Protection Server | 7.1 | All | All | All |
| Application | Safenet | Sentinel Protection Server | 7.2 | All | All | All |
| Application | Safenet | Sentinel Protection Server | 7.3 | All | All | All |
| Application | Safenet | Sentinel Protection Server | 7.4 | All | All | All |
| Application | Safenet | Sentinel Protection Server | 7.0 | All | All | All |
| Application | Safenet | Sentinel Protection Server | 7.1 | All | All | All |
| Application | Safenet | Sentinel Protection Server | 7.2 | All | All | All |
| Application | Safenet | Sentinel Protection Server | 7.3 | All | All | All |
| Application | Safenet | Sentinel Protection Server | 7.4 | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| SecurityTracker.com Archives - SafeNet Sentinel Products Let Remote Users Traverse the Directory | SECTRACK | www.securitytracker.com | Exploit |
| Webmail : Solution de messagerie professionnelle - OVHcloud- OVH | VUPEN | www.vupen.com | |
| Secure Support | CONFIRM | safenet-inc.com | |
| SafeNet Sentinel Protection Server/Key Server Directory Traversal Vulnerability - Advisories - Secunia | SECUNIA | secunia.com | Vendor Advisory |
| IBM X-Force Exchange | XF | exchange.xforce.ibmcloud.com | |
| SecurityFocus | BUGTRAQ | www.securityfocus.com | |
| Sentinel Protection Server/Keys Server Directory Traversal Vulnerability | BID | www.securityfocus.com | Exploit, Patch |
| Honeywell Experion PKS Directory Traversal Vulnerability | ICS-CERT | MISC | ics-cert.us-cert.gov | |
| SecurityReason - Sentinel Protection Server Directory Traversal | SREASON | securityreason.com | |
| SecurityFocus | BUGTRAQ | www.securityfocus.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.