Refractor 2 engine Client URLs Directory Traversal
The Battlefield series is developed by DICE and published by Electronic Arts. Each BF2 and BF2142 server has some fields where the admin can specify the links to files and images like the sponsor and community logo. The client performs a very simple operation, it gets the URL and downloads the file saving it locally using its original name in the following folder. The problem is that the client doesn't check the URL and so it's possible to specify a directory traversal sequence like http://evil.com/../../../../../../../../../../../../../../../../boot.ini and the client will download the file boot.ini from the root of the C: drive. The same vulnerability affects also the DemoDownloadURL, DemoIndexURL and CustomMapsURL fields.