Skip to content

Latest commit

 

History

History
32 lines (23 loc) · 1.86 KB

CVE-2022-45269.md

File metadata and controls

32 lines (23 loc) · 1.86 KB

CVE-2022-45269: Directory Traversal in Linx Sphere LINX 7.35.ST15

Date: 12-12-2022

Vulnerability Type: Directory Traversal

Vendor or Product: Linx Sphere

Affected Product Code Base: LINX 7.35.ST15 - Versions affected: < LINX 7.35.ST15

CVSS: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H

Description

A directory traversal vulnerability in the component SCS.Web.Server.SPI/1.0 of Linx Sphere LINX 7.35.ST15 allows attackers to read arbitrary files.

Attack vector

To exploit the vulnerability, a remote attacker can use the following payload: /.../.../.../.../.../.../.../.../.../.../.../.../.../.../.../.../ followed by the file they want to access. Example: http://192.168.1.10:3000/../../../../../../../../../../../../windows/iis.log

Impact

This vulnerability allows a remote attacker to access arbitrary files on the server by exploiting a directory traversal flaw in the specified component. The vulnerability impacts Windows servers running IIS 10.0, permitting the reading of arbitrary Windows files, potentially leading to information disclosure.

CVE Entry on MITRE

CVE-2022-45269

Steps to reproduce

  1. Identify the Target URL
    • The vulnerable service is running on port 3000.
    • Example target URL: http://192.168.1.10:3000/

imagen

  1. Append the payload and the file path you want to access to the target URL
    • Example URL: http://192.168.1.10:3000/../../../../../../../../../../../../windows/win.ini

imagen