ID CVE-2011-4404
Summary The default configuration of the HTTP server in Jetty in vSphere Update Manager in VMware vCenter Update Manager 4.0 before Update 4 and 4.1 before Update 2 allows remote attackers to conduct directory traversal attacks and read arbitrary files via unspecified vectors, a related issue to CVE-2009-1523.
References
Vulnerable Configurations
  • cpe:2.3:a:vmware:vcenter_update_manager:4.0
    cpe:2.3:a:vmware:vcenter_update_manager:4.0
  • cpe:2.3:a:vmware:vcenter_update_manager:4.0:update_1
    cpe:2.3:a:vmware:vcenter_update_manager:4.0:update_1
  • cpe:2.3:a:vmware:vcenter_update_manager:4.1
    cpe:2.3:a:vmware:vcenter_update_manager:4.1
  • cpe:2.3:a:vmware:vcenter_update_manager:4.0:update_2
    cpe:2.3:a:vmware:vcenter_update_manager:4.0:update_2
  • cpe:2.3:a:vmware:vcenter_update_manager:4.0:update_3
    cpe:2.3:a:vmware:vcenter_update_manager:4.0:update_3
  • cpe:2.3:a:vmware:vcenter_update_manager:4.1:update_1
    cpe:2.3:a:vmware:vcenter_update_manager:4.1:update_1
CVSS
Base: 5.0 (as of 21-11-2011 - 10:55)
Impact:
Exploitability:
CWE CWE-16
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL NONE NONE
exploit-db via4
description VMware Update Manager Directory Traversal. CVE-2009-1523,CVE-2011-4404. Remote exploit for windows platform
id EDB-ID:18138
last seen 2016-02-02
modified 2011-11-21
published 2011-11-21
reporter Alexey Sintsov
source https://www.exploit-db.com/download/18138/
title VMware Update Manager Directory Traversal
metasploit via4
description This modules exploits a directory traversal vulnerability in VMWare Update Manager on port 9084. Versions affected by this vulnerability: vCenter Update Manager 4.1 prior to Update 2, vCenter Update Manager 4 Update 4.
id MSF:AUXILIARY/SCANNER/VMWARE/VMWARE_UPDATE_MANAGER_TRAVERSAL
last seen 2019-03-26
modified 2017-07-24
published 2015-06-08
reliability Normal
reporter Rapid7
source https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/scanner/vmware/vmware_update_manager_traversal.rb
title VMWare Update Manager 4 Directory Traversal
nessus via4
NASL family CGI abuses
NASL id VMWARE_VCENTER_UPDATE_MGR_VMSA-2011-0014.NASL
description The version of Jetty web server included with VMware vCenter Update Manager on the remote host has a directory traversal vulnerability. This is a variant of the issue previously addressed by VMware advisory VMSA-2010-0012. The web server runs as SYSTEM by default. A remote, unauthenticated attacker could exploit this to read arbitrary files from the host.
last seen 2019-02-21
modified 2018-11-15
plugin id 56958
published 2011-11-28
reporter Tenable
source https://www.tenable.com/plugins/index.php?view=single&id=56958
title VMware vCenter Update Manager Directory Traversal (VMSA-2011-0014)
packetstorm via4
data source https://packetstormsecurity.com/files/download/107176/DSECRG-11-042.txt
id PACKETSTORM:107176
last seen 2016-12-05
published 2011-11-21
reporter Alexey Sintsov
source https://packetstormsecurity.com/files/107176/VMware-Update-Manager-Directory-Traversal.html
title VMware Update Manager Directory Traversal
refmap via4
confirm
sectrack 1026341
Last major update 12-12-2011 - 23:09
Published 18-11-2011 - 22:58
Back to Top