CVE-2021-30497

Ivanti Avalanche (Premise) 6.3.2 allows remote unauthenticated users to read arbitrary files via Absolute Path Traversal. The imageFilePath parameter processed by the /AvalancheWeb/image endpoint is not verified to be within the scope of the image folder, e.g., the attacker can obtain sensitive information via the C:/Windows/system32/config/system.sav value.
Configurations

Configuration 1 (hide)

cpe:2.3:a:ivanti:avalanche:6.3.2:*:*:*:*:windows:*:*

History

13 Apr 2022, 17:44

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : 5.0
v3 : 7.5
CWE CWE-22
CPE cpe:2.3:a:ivanti:avalanche:6.3.2:*:*:*:*:windows:*:*
References (MISC) https://forums.ivanti.com/s/article/Security-Alert-CVE-2021-30497-Directory-Traversal-Vulnerability?language=en_US - (MISC) https://forums.ivanti.com/s/article/Security-Alert-CVE-2021-30497-Directory-Traversal-Vulnerability?language=en_US - Patch, Vendor Advisory
References (MISC) https://help.ivanti.com/wl/help/en_us/aod/5.4/Avalanche/Console/Launching_the_Avalanche.htm - (MISC) https://help.ivanti.com/wl/help/en_us/aod/5.4/Avalanche/Console/Launching_the_Avalanche.htm - Vendor Advisory
References (MISC) https://ssd-disclosure.com/ssd-advisory-ivanti-avalanche-directory-traversal/ - (MISC) https://ssd-disclosure.com/ssd-advisory-ivanti-avalanche-directory-traversal/ - Exploit, Third Party Advisory
First Time Ivanti
Ivanti avalanche

06 Apr 2022, 02:15

Type Values Removed Values Added
New CVE

Information

Published : 2022-04-06 02:15

Updated : 2023-12-10 14:22


NVD link : CVE-2021-30497

Mitre link : CVE-2021-30497

CVE.ORG link : CVE-2021-30497


JSON object : View

Products Affected

ivanti

  • avalanche
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')