vendor:
Webtareas
by:
China Banking and Insurance Information Technology Management Co.,Ltd.
7.5
CVSS
HIGH
Arbitrary File Read
22
CWE
Product Name: Webtareas
Affected Version From: Webtateas v2.0
Affected Version To: Webtateas v2.0
Patch Exists: NO
Related CWE: N/A
CPE: a:webtareas:webtareas:2.0
Metasploit:
N/A
Other Scripts:
N/A
Platforms Tested: Windows
2020
Webtateas 2.0 – Arbitrary File Read
An attacker can exploit this vulnerability by sending a specially crafted POST request to the vulnerable application. The request contains an action parameter with a value of cardview-actions and a prefix and extpath parameter with a value of '../' and '../../../../Windows/win.ini' respectively. This allows the attacker to read arbitrary files from the server.
Mitigation:
The application should validate user input and restrict access to sensitive files.