CVE-2014-5393
Summary
| CVE | CVE-2014-5393 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2014-09-11 15:55:00 UTC |
| Updated | 2018-10-09 19:50:00 UTC |
| Description | Directory traversal vulnerability in the JobScheduler Operations Center (JOC) in SOS JobScheduler before 1.6.4246 and 1.7.x before 1.7.4241 allows remote authenticated users with the info permission to read arbitrary files in the webroot via unspecified vectors. |
Risk And Classification
Problem Types: CWE-22
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Sos | Jobscheduler | 1.6.4014 | All | All | All |
| Application | Sos | Jobscheduler | 1.6.4043 | All | All | All |
| Application | Sos | Jobscheduler | 1.7.4177 | All | All | All |
| Application | Sos | Jobscheduler | 1.7.4189 | All | All | All |
| Application | Sos | Jobscheduler | 1.6.4014 | All | All | All |
| Application | Sos | Jobscheduler | 1.6.4043 | All | All | All |
| Application | Sos | Jobscheduler | 1.7.4177 | All | All | All |
| Application | Sos | Jobscheduler | 1.7.4189 | All | All | All |
| Application | Sos | Jobscheduler | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| 403 Forbidden | CONFIRM | www.sos-berlin.com | Vendor Advisory |
| 403 Forbidden | CONFIRM | www.sos-berlin.com | Vendor Advisory |
| JobScheduler Path Traversal ≈ Packet Storm | MISC | packetstormsecurity.com | Exploit |
| SecurityFocus | BUGTRAQ | www.securityfocus.com | |
| www.christian-schneider.net/advisories/CVE-2014-5393.txt | MISC | www.christian-schneider.net | Exploit |
| [JS-1205] Path Traversal Vulnerability (CVE-2014-5393) - SOS JIRA | CONFIRM | change.sos-berlin.com | |
| IBM X-Force Exchange | XF | exchange.xforce.ibmcloud.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.