vendor:
OpenCTI
by:
Raif Berkay Dincel
7.5
CVSS
HIGH
Directory Traversal
22
CWE
Product Name: OpenCTI
Affected Version From: 3.3.2001
Affected Version To: 3.3.2001
Patch Exists: NO
Related CWE:
CPE:
Platforms Tested: Linux Mint, Windows 10
2020
OpenCTI 3.3.1 – Directory Traversal
The OpenCTI 3.3.1 version is vulnerable to directory traversal. This vulnerability allows an attacker to access arbitrary files on the server by manipulating the 'TARGET/static/css/' parameter in a GET request. By using a payload like '../../../../../../../../etc/passwd', an attacker can retrieve sensitive information such as the password file.
Mitigation:
To mitigate this vulnerability, it is recommended to sanitize user input and validate file paths before processing them. Additionally, access controls and permissions should be properly configured to restrict unauthorized access to sensitive files.