An issue was discovered in NcMonitorServer.exe in NC Monitor Server in NComputing vSpace Pro 10 and 11. It is possible to read arbitrary files outside the root directory of the web server. This vulnerability could be exploited remotely by a crafted URL without credentials, with .../ or ...\ or ..../ or ....\ as a directory-traversal pattern to TCP port 8667.
References
| Link | Resource |
|---|---|
| http://www.kwell.net/kwell_blog/?p=5199 | Exploit Third Party Advisory |
| https://www.kwell.net/kwell/index.php?option=com_newsfeeds&view=newsfeed&id=15&Itemid=173&lang=es | Third Party Advisory |
| https://www.exploit-db.com/exploits/44497/ | Exploit Third Party Advisory VDB Entry |
| https://support.ncomputing.com/portal/kb/articles/ncomputing-health-monitor-server-vulnerability-patch |
Configurations
Configuration 1 (hide)
|
Information
Published : 2018-04-20 01:29
Updated : 2018-05-15 18:29
NVD link : CVE-2018-10201
Mitre link : CVE-2018-10201
JSON object : View
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Products Affected
ncomputing
- vspace_pro


