vendor:
gSOAP
by:
Numan Türle
7.5
CVSS
HIGH
Directory Traversal
22
CWE
Product Name: gSOAP
Affected Version From: 2.8
Affected Version To: 2.8
Patch Exists: YES
Related CWE: N/A
CPE: a:genivia:gsoap
Metasploit:
N/A
Other Scripts:
N/A
Platforms Tested: N/A
2019
gSOAP 2.8 – Directory Traversal
A directory traversal vulnerability exists in gSOAP 2.8 which allows an attacker to read arbitrary files on the server. This is due to the application not properly sanitizing user-supplied input. An attacker can send a specially crafted HTTP request containing directory traversal characters (e.g. '../') to read arbitrary files on the server.
Mitigation:
The vendor has released a patch to address this issue. It is recommended to upgrade to the latest version of gSOAP.