exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Gigamon GigaVUE 5.5.01.11 Directory Traversal / File Upload

Gigamon GigaVUE 5.5.01.11 Directory Traversal / File Upload
Posted Apr 29, 2020
Authored by Balazs Hambalko

Gigamon GigaVUE version 5.5.01.11 suffers from directory traversal and file upload with command execution vulnerabilities. Gigamon has chosen to sunset this product and not offer a patch.

tags | exploit, vulnerability, file inclusion, file upload
advisories | CVE-2020-12251, CVE-2020-12252
SHA-256 | 4f94429e64d9c424c9369febb776c41eae261c908658edff22b96292c43a0a65

Gigamon GigaVUE 5.5.01.11 Directory Traversal / File Upload

Change Mirror Download
Hi,

An issue was discovered in Gigamon GigaVUE 5.5.01.11.
The upload functionality allows an authenticated user to change the
filename value (in the POST method) from the original filename
to achieve directory traversal via a ../ sequence and, for example,
obtain a complete directory listing of the machine.

------------------------------------------

[Additional Information]
This vulnerability aid the attacker in discovering the whole file
system in the underlying host system - including identifying the
writeable and read-only file systems.

The authenticated user needs to use the upload functionality. The POST
HTTP verb is being used which needs to be intercepted, and modified
(the "filename" parameter must be manipulated in the POST body
section)

These vulnerabilities were reported to the vendor. They said this
version will be decommissioned in 2023 and they decided not to provide
technical support anymore. In other words, they will not fix any IT
Security Issues which have lower than critical risk. This
version is in production in enterprise environments, and will be
available until end of 2023, so the impact is real.

------------------------------------------

[Vulnerability Type]
Directory Traversal

------------------------------------------

[Vendor of Product]
Gigamon

------------------------------------------

[Affected Product Code Base]
GigaVUE - 5.5.01.11

------------------------------------------

[Affected Component]
Upload functionality

------------------------------------------

[Attack Type]
Remote

------------------------------------------

[Impact Information Disclosure]
true

------------------------------------------

[Attack Vectors]
The authenticated user needs to use the upload functionality. The POST
HTTP verb is being used which needs to be intercepted, and modified
(the "filename" parameter must be manipulated in the POST body
section)

------------------------------------------

[Reference]https://www.gigamon.com/products/access-traffic/physical-nodes.html

------------------------------------------

[Has vendor confirmed or acknowledged the vulnerability?]
true

------------------------------------------

[Discoverer]
Balazs Hambalko, IT Security Consultant

Use CVE-2020-12251.



An issue was discovered in Gigamon GigaVUE 5.5.01.11. The upload
functionality allows an arbitrary file upload for an authenticated
user. If an executable file is uploaded into the www-root directory,
then it could yield remote code execution via the filename parameter.

------------------------------------------

[Additional Information]
These vulnerabilities were reported to the vendor. They said this
version will be decommissioned in 2023 and they decided not to provide
technical support anymore. In other words, they will not fix any IT
Security Issues which have lower than critical risk. This
version is in production in enterprise environments, and will be
available until end of 2023, so the impact is real.

------------------------------------------

[Vulnerability Type]
Insecure Permissions

------------------------------------------

[Vendor of Product]
Gigamon

------------------------------------------

[Affected Product Code Base]
GigaVUE - 5.5.01.11

------------------------------------------

[Affected Component]
Upload functionality

------------------------------------------

[Attack Type]
Remote

------------------------------------------

[Impact Code execution]
true

------------------------------------------

[Attack Vectors]
The authenticated user needs to use the upload functionality. The POST
HTTP verb is being used which needs to be intercepted, and modified
(the "filename" parameter must be manipulated in the POST body
section)

------------------------------------------

[Reference]https://www.gigamon.com/products/access-traffic/physical-nodes.html

------------------------------------------

[Has vendor confirmed or acknowledged the vulnerability?]
true

------------------------------------------

[Discoverer]
Balazs Hambalko, IT Security Consultant


Use CVE-2020-12252.


Login or Register to add favorites

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    28 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close