CVE-2008-0457
Summary
| CVE | CVE-2008-0457 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2008-02-07 21:00:00 UTC |
| Updated | 2018-10-15 22:00:00 UTC |
| Description | Unrestricted file upload vulnerability in the FileUpload class running on the Symantec LiveState Apache Tomcat server, as used by Symantec Backup Exec System Recovery Manager 7.0 and 7.0.1, allows remote attackers to upload and execute arbitrary JSP files via unknown vectors. |
Risk And Classification
Problem Types: CWE-20
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Symantec | Backupexec System Recovery | 7.0 | All | All | All |
| Application | Symantec | Backupexec System Recovery | 7.01 | All | All | All |
| Application | Symantec | Backupexec System Recovery | 7.0 | All | All | All |
| Application | Symantec | Backupexec System Recovery | 7.01 | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| SecurityFocus | BUGTRAQ | www.securityfocus.com | |
| SecurityTracker.com Archives - Symantec BackupExec System Recovery Manager Lets Remote Users Upload Arbitrary Files and Execute Arbitrary Code | SECTRACK | www.securitytracker.com | |
| Symantec Backup Exec System Recovery Manager File Upload Vulnerability - Secunia Advisories - Vulnerability Intelligence - Secunia.com | SECUNIA | secunia.com | Vendor Advisory |
| Webmail : Solution de messagerie professionnelle - OVHcloud- OVH | VUPEN | www.vupen.com | Vendor Advisory |
| Symantec Security Advisory | CONFIRM | www.symantec.com | Patch |
| Symantec Backup Exec System Recovery Manager FileUpload Class Unauthorized File Upload Vulnerability | BID | www.securityfocus.com | Exploit |
| Backup Exec System Recovery Manager <= 7.0.1 File Upload Exploit | EXPLOIT-DB | www.exploit-db.com | |
| Invalid URL | CONFIRM | seer.entsupport.symantec.com | Patch |
| Zero Day Initiative | MISC | www.zerodayinitiative.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.