vendor:
Fluig
by:
Lucas Souza
8.8
CVSS
HIGH
Path Traversal
22
CWE
Product Name: Fluig
Affected Version From: 1.7.0-210217
Affected Version To: 1.7.0-201124
Patch Exists: YES
Related CWE: N/A
CPE: a:totvs:fluig:1.7.0
Metasploit:
N/A
Other Scripts:
N/A
Platforms Tested: Windows, Linux, Mac
2020
Fluig 1.7.0 – Path Traversal
Fluig 1.7.0 is vulnerable to Path Traversal. An attacker can use this vulnerability to access sensitive files and directories that are stored outside the web root folder. This can include application files, configuration files, and other files stored on the server. The vulnerability exists due to insufficient validation of user-supplied input in the 'file' parameter of the 'vol' parameter. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing directory traversal characters (e.g., '../') in the 'file' parameter of the 'vol' parameter.
Mitigation:
The vendor has released a patch to address this vulnerability. Users are advised to update to the latest version of Fluig 1.7.0.