{"vuid":"VU#243243","idnumber":"243243","name":"Entrust GetAccess does not validate user input thereby allowing users to read arbitrary files","keywords":["entrust","GetAccess","directory traversal","java class files","user input"],"overview":"Entrust GetAccess does not properly validate the CGI variable \"LOCALE\" and may be exploited to read arbitrary files on the server.","clean_desc":"Entrust GetAccess is a web software product for identifying users of a web site. Entrust GetAccess takes a CGI variable named \"LOCALE\" specifying a server directory in which to find international localization files. Entrust GetAccess does not adequately validate the LOCALE value to remove '../' and other character sequences allowing directory traversal.","impact":"A remote attacker can read any file on the server to which the web server process has read privileges.","resolution":"Apply a patch For more information, login to: https://login.encommerce.com/private/docs/techSupport/Patches-BugFix","workarounds":"","sysaffected":"","thanks":"Thanks to Rudi Carell for reporting this vulnerability.","author":"This document was written by Shawn Van Ittersum.","public":["h","t","t","p",":","/","/","w","w","w",".","s","e","c","u","r","i","t","y","f","o","c","u","s",".","c","o","m","/","b","i","d","/","3","5","0","8"],"cveids":[""],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2001-11-05T17:39:06Z","publicdate":"2001-11-05T00:00:00Z","datefirstpublished":"2002-09-18T14:09:22Z","dateupdated":"2002-09-18T14:09:28Z","revision":6,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"4","cam_population":"5","cam_impact":"4","cam_easeofexploitation":"15","cam_attackeraccessrequired":"20","cam_scorecurrent":"2.1375","cam_scorecurrentwidelyknown":"2.7","cam_scorecurrentwidelyknownexploited":"4.95","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":2.1375,"vulnote":null}