In Axway File Transfer Direct 2.7.1, an unauthenticated Directory Traversal vulnerability can be exploited by issuing a specially crafted HTTP GET request with %2e instead of '.' characters, as demonstrated by an initial /h2hdocumentation//%2e%2e/ substring.
References
Link | Resource |
---|---|
https://inf0seq.github.io/cve/2019/01/20/Directory-Traversal-in-Axway-File-Transfer-Direct.html | Exploit Third Party Advisory |
https://github.com/inf0seq/inf0seq.github.io/blob/master/_posts/2019-01-20-Directory-Traversal-in-Axway-File-Transfer-Direct.md | Exploit Third Party Advisory |
Configurations
Information
Published : 2019-01-20 22:29
Updated : 2019-02-08 12:03
NVD link : CVE-2019-6500
Mitre link : CVE-2019-6500
JSON object : View
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Products Affected
axway
- file_tranfer_direct