vendor:
Xerte
by:
Rik Lutz
6.5
CVSS
MEDIUM
Directory Traversal
22
CWE
Product Name: Xerte
Affected Version From: 3.10.2003
Affected Version To: 3.10.2003
Patch Exists: YES
Related CWE: CVE-2021-44665
CPE: a:xerte:xerte
Platforms Tested: Windows 10 XAMP
2021
Xerte 3.10.3 – Directory Traversal (Authenticated)
This PoC assumes guest login is enabled. Vulnerable url: https://<host>/getfile.php?file=<user-direcotry>/../../database.php You can find a userfiles-directory by creating a project and browsing the media menu. Create new project from template -> visit 'Properties' (! symbol) -> Media and Quota -> Click file to download The userfiles-direcotry will be noted in the URL and/or when you download a file. They look like: <numbers>-<username>-<templatename>
Mitigation:
Ensure that guest login is disabled and that access to the getfile.php script is restricted to authenticated users.