IBM Sterling Secure Proxy 6.0.0.0, 6.0.0.1, 6.0.0.2, 6.0.0.3, and 6.1.0.0 could allow a remote attacker to traverse directories on the system. An attacker could send a specially crafted URL request containing "dot dot dot" sequences (/.../) to view arbitrary files on the system.
| Software | From | Fixed in |
|---|---|---|
| ibm / sterling_secure_proxy | 6.0.1.0 | 6.0.1.0.x |
| ibm / sterling_secure_proxy | 6.0.0.0 | 6.0.0.0.x |
| ibm / sterling_secure_proxy | 6.0.3.0 | 6.0.3.0.x |
| ibm / sterling_secure_proxy | 6.1.0 | 6.1.0.x |
| ibm / sterling_secure_proxy | 6.0.2.0 | 6.0.2.0.x |