Impact
This vulnerability in IBM Guardium Data Protection 12.1 allows an administrator who can send crafted HTTP requests to write files anywhere in the underlying operating system. Exploitation yields the ability to place arbitrary content, which could include malicious executables or configuration files, thereby compromising system integrity and potentially enabling further attacks. The weakness is a classic directory traversal flaw (CWE-22) and is limited to users with administrative privileges, but even an accidental misuse could damage critical data or create backdoors.
Affected Systems
Affected is IBM Guardium Data Protection version 12.1, including build 12.1.0 and any 12.1 release that has not applied the listed fix. The product is available for Linux platforms.
Risk and Exploitability
The CVSS score of 4.9 indicates a moderate impact, and the EPSS score of less than 1% suggests that analyst data does not show a high likelihood of active exploitation. The vulnerability is not listed in CISA's KEV catalog. Attackers would need to interact with the web interface as an administrative user and supply a URL containing "../" sequences to influence the file path. Once authenticated, the attacker can write files anywhere in the system tree, providing a foothold for further compromise.
OpenCVE Enrichment