534
VMScore

CVE-2020-12252

Published: 29/04/2020 Updated: 18/05/2020
CVSS v2 Base Score: 6 | Impact Score: 6.4 | Exploitability Score: 6.8
CVSS v3 Base Score: 6.2 | Impact Score: 5.5 | Exploitability Score: 0.7
VMScore: 534
Vector: AV:N/AC:M/Au:S/C:P/I:P/A:P

Vulnerability Summary

An issue exists in Gigamon GigaVUE 5.5.01.11. The upload functionality allows an arbitrary file upload for an authenticated user. If an executable file is uploaded into the www-root directory, then it could yield remote code execution via the filename parameter.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

gigamon gigavue

Exploits

Gigamon GigaVUE version 550111 suffers from directory traversal and file upload with command execution vulnerabilities Gigamon has chosen to sunset this product and not offer a patch ...

Mailing Lists

Hi, An issue was discovered in Gigamon GigaVUE 550111 The upload functionality allows an authenticated user to change the filename value (in the POST method) from the original filename to achieve directory traversal via a / sequence and, for example, obtain a complete directory listing of the machine --------------------------------------- ...