{"vuid":"VU#543310","idnumber":"543310","name":"ManageEngine ServiceDesk directory traversal vulnerability","keywords":["ManageEngine","ServiceDesk","Directory Traversal"],"overview":"ManageEngine ServiceDesk contains a directory traversal vulnerability which may allow a remote, unauthenticated attacker to obtain sensitive information.","clean_desc":"ManageEngine ServiceDesk Plus 8.0, and possibly prior versions, contains a directory traversal vulnerability in the FileDownload.jsp page caused by an input validation error when handling requests. Additionally, ServiceDesk Plus 8.0 fails to verify that requests to the FileDownload.jsp page originate from an authenticated user. An unauthenticated attacker can exploit these vulnerabilities via directory traversal specifiers sent in a specially crafted request to the FileDownload.jsp page.","impact":"A remote unauthenticated attacker could obtain sensitive information.","resolution":"Apply an Update ManageEngine recommends users update to ManageEngine Service Desk Build 8012 or later.","workarounds":"","sysaffected":"","thanks":"Thanks to Keith Lee Yong Ming for reporting this vulnerability.","author":"This document was written by Jared Allar.","public":["h","t","t","p",":","/","/","w","w","w",".","m","a","n","a","g","e","e","n","g","i","n","e",".","c","o","m","/","p","r","o","d","u","c","t","s","/","s","e","r","v","i","c","e","-","d","e","s","k","/","s","e","r","v","i","c","e","-","p","a","c","k","s",".","h","t","m","l"],"cveids":[""],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2011-05-03T16:42:31Z","publicdate":"2011-06-21T00:00:00Z","datefirstpublished":"2011-06-27T13:40:27Z","dateupdated":"2011-06-27T13:40:28Z","revision":10,"vrda_d1_directreport":"1","vrda_d1_population":"2","vrda_d1_impact":"3","cam_widelyknown":"0","cam_exploitation":"0","cam_internetinfrastructure":"3","cam_population":"15","cam_impact":"8","cam_easeofexploitation":"18","cam_attackeraccessrequired":"20","cam_scorecurrent":"2.43","cam_scorecurrentwidelyknown":"18.63","cam_scorecurrentwidelyknownexploited":"34.83","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":2.43,"vulnote":null}