[原文]Nokia Electronic Documentation (NED) 5.0 allows remote attackers to obtain a directory listing of the WebLogic web root, and the physical path of the NED server, via a "retrieve" action with a location parameter of . (dot).
Nokia Electronic Documentation (NED) is prone to a vulnerability that may enable remote attackers to list directory contents. This issue may be exploited by appending a dot (.) to a request for a NED page. Exploitation will also have the side-effect of disclosing the path to the directory.
This issue was reported for NED installations hosted on WebLogic application servers. It is not known if NED is prone to the same behavior when hosted on other servers. It should be noted that although this vulnerability has been reported to affect Nokia Electronic Documentation version 5.0, previous versions might also be affected.
Nokia Electronic Documentation Directory Disclosure
Nokia Electronic Documentation contains a flaw that allows a remote attacker to obtain a directory listing of the root web directory and display the physical path of the web server. The issue is due to the NED utility not sanitizing input and allowing any directory to be specified. By supplying a "." as the location you want to retrieve, it will display the contents of the web root directory. This will also cause NED to display the full physical path of the web server installation.
Currently, there are no known upgrades, patches, or workarounds available to
correct this issue.