Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-4w43-v393-px48

Опубликовано: 16 июл. 2025
Источник: github
Github: Не прошло ревью
CVSS4: 8.8

Описание

A remote file disclosure vulnerability exists in EasyCafe Server 2.2.14, exploitable by unauthenticated remote attackers via TCP port 831. The server listens for a custom protocol where opcode 0x43 can be used to request arbitrary files by absolute path. If the file exists and is accessible, its content is returned without authentication. This flaw allows attackers to retrieve sensitive files such as system configuration, password files, or application data.

A remote file disclosure vulnerability exists in EasyCafe Server 2.2.14, exploitable by unauthenticated remote attackers via TCP port 831. The server listens for a custom protocol where opcode 0x43 can be used to request arbitrary files by absolute path. If the file exists and is accessible, its content is returned without authentication. This flaw allows attackers to retrieve sensitive files such as system configuration, password files, or application data.

EPSS

Процентиль: 96%
0.29559
Средний

8.8 High

CVSS4

Дефекты

CWE-306

Связанные уязвимости

nvd
7 месяцев назад

A remote file disclosure vulnerability exists in EasyCafe Server 2.2.14, exploitable by unauthenticated remote attackers via TCP port 831. The server listens for a custom protocol where opcode 0x43 can be used to request arbitrary files by absolute path. If the file exists and is accessible, its content is returned without authentication. This flaw allows attackers to retrieve sensitive files such as system configuration, password files, or application data.

EPSS

Процентиль: 96%
0.29559
Средний

8.8 High

CVSS4

Дефекты

CWE-306