Within Sahi Pro 8.0.0, an attacker can send a specially crafted URL to include any victim files on the system via the script parameter on the Script_view page. This will result in file disclosure (i.e., being able to pull any file from the remote victim application). This can be used to steal and obtain sensitive config and other files. This can result in complete compromise of the application. The script parameter is vulnerable to directory traversal and both local and remote file inclusion.
References
Link | Resource |
---|---|
https://sahipro.com/downloads-archive/ | Vendor Advisory |
https://www.exploit-db.com/exploits/47062 | Exploit Third Party Advisory VDB Entry |
https://sahipro.com/downloads-archive/ | Vendor Advisory |
https://www.exploit-db.com/exploits/47062 | Exploit Third Party Advisory VDB Entry |
Configurations
History
21 Nov 2024, 04:24
Type | Values Removed | Values Added |
---|---|---|
References | () https://sahipro.com/downloads-archive/ - Vendor Advisory | |
References | () https://www.exploit-db.com/exploits/47062 - Exploit, Third Party Advisory, VDB Entry |
Information
Published : 2019-09-23 15:15
Updated : 2024-11-21 04:24
NVD link : CVE-2019-13063
Mitre link : CVE-2019-13063
CVE.ORG link : CVE-2019-13063
JSON object : View
Products Affected
sahipro
- sahi_pro
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')