Within Sahi Pro 8.0.0, an attacker can send a specially crafted URL to include any victim files on the system via the script parameter on the Script_view page. This will result in file disclosure (i.e., being able to pull any file from the remote victim application). This can be used to steal and obtain sensitive config and other files. This can result in complete compromise of the application. The script parameter is vulnerable to directory traversal and both local and remote file inclusion.
References
Link | Resource |
---|---|
https://www.exploit-db.com/exploits/47062 | Exploit Third Party Advisory VDB Entry |
https://sahipro.com/downloads-archive/ | Vendor Advisory |
Configurations
Information
Published : 2019-09-23 08:15
Updated : 2019-09-23 11:48
NVD link : CVE-2019-13063
Mitre link : CVE-2019-13063
JSON object : View
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Products Affected
sahipro
- sahi_pro