CVE-2025-3355
Unknown
Unknown - Not Provided
BaseFortify
Publication date: 2025-10-30
Last updated on: 2025-11-07
Assigner: IBM Corporation
Description
Description
IBM Tivoli Monitoring 6.3.0.7 through 6.3.0.7 Service Pack 21 could allow a remote attacker to traverse directories on the system. An attacker could send a specially crafted URL request containing "dot dot" sequences (/../) to view arbitrary files on the system.
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| ibm | tivoli_monitoring | 6.3.0.7 |
| ibm | tivoli_monitoring | 6.3.0.7 |
| ibm | tivoli_monitoring | 6.3.0.7 |
| ibm | tivoli_monitoring | 6.3.0.7 |
| ibm | tivoli_monitoring | 6.3.0.7 |
| ibm | tivoli_monitoring | 6.3.0.7 |
| ibm | tivoli_monitoring | 6.3.0.7 |
| ibm | tivoli_monitoring | 6.3.0.7 |
| ibm | tivoli_monitoring | 6.3.0.7 |
| ibm | tivoli_monitoring | 6.3.0.7 |
| ibm | tivoli_monitoring | 6.3.0.7 |
| ibm | tivoli_monitoring | 6.3.0.7 |
| ibm | tivoli_monitoring | 6.3.0.7 |
| ibm | tivoli_monitoring | 6.3.0.7 |
| ibm | tivoli_monitoring | 6.3.0.7 |
| ibm | tivoli_monitoring | 6.3.0.7 |
| ibm | tivoli_monitoring | 6.3.0.7 |
| ibm | tivoli_monitoring | 6.3.0.7 |
| ibm | tivoli_monitoring | 6.3.0.7 |
| ibm | tivoli_monitoring | 6.3.0.7 |
| ibm | tivoli_monitoring | 6.3.0.7 |
| ibm | tivoli_monitoring | 6.3.0.7 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-22 | The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory. |
Attack-Flow Graph
Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70