Directory Traversal Vulnerability in Apache OpenMeetings Remote Administration
CVE-2016-0784
6.5MEDIUM
Summary
A directory traversal vulnerability exists in the Import/Export System Backups functionality of Apache OpenMeetings prior to version 3.1.1. This flaw allows remote authenticated administrators to manipulate ZIP archive contents, enabling them to write to arbitrary files on the server. By utilizing crafted ZIP entries with directory traversal sequences (such as '..'), an attacker could gain unauthorized access to the file system, leading to potential exposure of sensitive data or execution of malicious payloads. It is critical for administrators to update their instances of Apache OpenMeetings to the latest version to mitigate this security risk.
References
EPSS Score
9% chance of being exploited in the next 30 days.
CVSS V3.1
Score:
6.5
Severity:
MEDIUM
Confidentiality:
None
Integrity:
High
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved