Описание
Directory traversal vulnerability in the file download functionality in ZOHO WebNMS Framework 5.2 and 5.2 SP1 allows remote attackers to read arbitrary files via a .. (dot dot) in the fileName parameter to servlets/FetchFile.
Ссылки
- ExploitThird Party Advisory
- ExploitMailing List
- Third Party Advisory
- Third Party Advisory
- Third Party AdvisoryVDB Entry
- ExploitTechnical DescriptionThird Party Advisory
- Exploit
- ExploitThird Party Advisory
- ExploitThird Party Advisory
- ExploitMailing List
- Third Party Advisory
- Third Party Advisory
- Third Party AdvisoryVDB Entry
- ExploitTechnical DescriptionThird Party Advisory
- Exploit
- ExploitThird Party Advisory
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:a:zohocorp:webnms_framework:5.2:*:*:*:*:*:*:*
cpe:2.3:a:zohocorp:webnms_framework:5.2:sp1:*:*:*:*:*:*
EPSS
Процентиль: 100%
0.9278
Критический
7.5 High
CVSS3
5 Medium
CVSS2
Дефекты
CWE-22
Связанные уязвимости
CVSS3: 7.5
github
больше 3 лет назад
Directory traversal vulnerability in the file download functionality in ZOHO WebNMS Framework 5.2 and 5.2 SP1 allows remote attackers to read arbitrary files via a .. (dot dot) in the fileName parameter to servlets/FetchFile.
EPSS
Процентиль: 100%
0.9278
Критический
7.5 High
CVSS3
5 Medium
CVSS2
Дефекты
CWE-22