Vulnerability Description
NTT Data TERASOLUNA Server Framework for Java(WEB) 2.0.0.1 through 2.0.6.1, as used in Fujitsu Interstage Business Application Server and other products, allows remote attackers to bypass a file-extension protection mechanism, and consequently read arbitrary files, via a crafted pathname.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Nttdata | Terasoluna Server Framework For Java Web | 2.0.0.1 |
Related Weaknesses (CWE)
References
- http://jvn.jp/en/jp/JVN74659077/index.htmlVendor Advisory
- http://jvndb.jvn.jp/jvndb/JVNDB-2016-000098Vendor Advisory
- http://www.fujitsu.com/jp/products/software/resources/condition/security/vulneraVendor Advisory
- http://jvn.jp/en/jp/JVN74659077/index.htmlVendor Advisory
- http://jvndb.jvn.jp/jvndb/JVNDB-2016-000098Vendor Advisory
- http://www.fujitsu.com/jp/products/software/resources/condition/security/vulneraVendor Advisory
FAQ
What is CVE-2016-1183?
CVE-2016-1183 is a vulnerability with a CVSS score of 3.7 (LOW). NTT Data TERASOLUNA Server Framework for Java(WEB) 2.0.0.1 through 2.0.6.1, as used in Fujitsu Interstage Business Application Server and other products, allows remote attackers to bypass a file-exten...
How severe is CVE-2016-1183?
CVE-2016-1183 has been rated LOW with a CVSS base score of 3.7/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2016-1183?
Check the references section above for vendor advisories and patch information. Affected products include: Nttdata Terasoluna Server Framework For Java Web.