Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-qr2q-986w-ccv6

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The OpenUrlToBuffer method in the BWOCXRUN.BwocxrunCtrl.1 ActiveX control in bwocxrun.ocx in Advantech WebAccess before 7.2 allows remote attackers to read arbitrary files via a file: URL.

The OpenUrlToBuffer method in the BWOCXRUN.BwocxrunCtrl.1 ActiveX control in bwocxrun.ocx in Advantech WebAccess before 7.2 allows remote attackers to read arbitrary files via a file: URL.

EPSS

Процентиль: 56%
0.00339
Низкий

Дефекты

CWE-200
CWE-538

Связанные уязвимости

nvd
почти 12 лет назад

The BWOCXRUN.BwocxrunCtrl.1 control contains a method named “OpenUrlToBuffer.” This method takes a URL as a parameter and returns its contents to the caller in JavaScript. The URLs are accessed in the security context of the current browser session. The control does not perform any URL validation and allows “file://” URLs that access the local disk. The method can be used to open a URL (including file URLs) and read file URLs through JavaScript. This method could also be used to reach any arbitrary URL to which the browser has access.

EPSS

Процентиль: 56%
0.00339
Низкий

Дефекты

CWE-200
CWE-538