본문 바로가기

취약점 정보1

ES file explorer vulnerable

728x90

JVN#70029459
ES File Explorer vulnerable to directory traversal

Overview

ES File Explorer provided by ES APP Group contains a directory traversal vulnerability.

Products Affected

  • ES File Explorer versions prior to 3.0.4

Description

ES File Explorer provided by ES APP Group contains an issue in processing file names, which may result in a directory traversal (CWE-22) vulnerability.

Impact

A remote, unauthenticated attacker may create an arbitrary file or overwrite an existing file in a directory that the application has privileges to access.

Solution

Apply an Update
Update to the latest version according to the information provided by the developer.

Vendor Status

VendorLink
ES APP GroupES File Explorer

References

    JPCERT/CC Addendum

    Vulnerability Analysis by JPCERT/CC

    Analyzed on 2014.03.20

    MeasuresConditionsSeverity
    Access Requiredcan be attacked over the Internet using packets
    • High
    •  
    Authenticationanonymous or no authentication (IP addresses do not count)
    • High
    •  
    User Interaction Requiredthe user must be convinced to take a standard action that does not feel harmful to most users, such as click on a link or view a file
    • Mid
    •  
    Exploit Complexitysome expertise and/or luck required (most buffer overflows, guessing correctly in small space, expertise in Windows function calls)
    • Mid-High
    •  

    Description of each analysis measures

    Credit

    Ryohei Koike of Sakura Information Systems Co., Ltd. reported this vulnerability to IPA.
    JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.

    Other Information

    JPCERT Alert
    JPCERT Reports
    CERT Advisory
    CPNI Advisory
    TRnotes
    CVECVE-2014-1970
    JVN iPediaJVNDB-2014-000033
    728x90