vendor:
ZKBioSecurity 3.0
by:
Gjoko 'LiquidWorm' Krstic
7.5
CVSS
HIGH
File Path Manipulation
22
CWE
Product Name: ZKBioSecurity 3.0
Affected Version From: 3.0.1.0_R_230
Affected Version To: 3.0.1.0_R_230
Patch Exists: NO
Related CWE:
CPE:
Platforms Tested: Windows 7 Ultimate SP1, Windows 7 Professional SP1, Apache-Coyote/1.1, Apache Tomcat/7.0.56
2016
ZKTeco ZKBioSecurity 3.0 File Path Manipulation Vulnerability
File path manipulation vulnerabilities arise when user-controllable data is placed into a file or URL path that is used on the server to access local resources, which may be within or outside the web root. An attacker can modify the file path to access different resources, which may contain sensitive information. Even where an attack is constrained within the web root, it is often possible to retrieve items that are normally protected from direct access, such as application configuration files, the source code for server-executable scripts, or files with extensions that the web server is not configured to serve directly.
Mitigation:
Apply proper input validation and sanitization techniques to user-controlled input that is used in file or URL paths. Also, ensure that sensitive files or directories are not accessible directly through the web server.