A directory traversal vulnerability in the component SCS.Web.Server.SPI/1.0 of Linx Sphere LINX 7.35.ST15 allows attackers to read arbitrary files.
To exploit the vulnerability, a remote attacker can use the following payload: /.../.../.../.../.../.../.../.../.../.../.../.../.../.../.../.../ followed by the file they want to access. Example: http://192.168.1.10:3000/../../../../../../../../../../../../windows/iis.log
This vulnerability allows a remote attacker to access arbitrary files on the server by exploiting a directory traversal flaw in the specified component. The vulnerability impacts Windows servers running IIS 10.0, permitting the reading of arbitrary Windows files, potentially leading to information disclosure.
- Identify the Target URL
- The vulnerable service is running on port 3000.
- Example target URL:
http://192.168.1.10:3000/
- Append the payload and the file path you want to access to the target URL
- Example URL:
http://192.168.1.10:3000/../../../../../../../../../../../../windows/win.ini
- Example URL: