Within Sahi Pro 8.0.0, an attacker can send a specially crafted URL to include any victim files on the system via the script parameter on the Script_view page. This will result in file disclosure (i.e., being able to pull any file from the remote victim application). This can be used to steal and obtain sensitive config and other files. This can result in complete compromise of the application. The script parameter is vulnerable to directory traversal and both local and remote file inclusion.
References
Link | Resource |
---|---|
https://sahipro.com/downloads-archive/ | Vendor Advisory |
https://www.exploit-db.com/exploits/47062 | Exploit Third Party Advisory VDB Entry |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2019-09-23T14:56:59
Updated: 2019-09-23T14:56:59
Reserved: 2019-06-29T00:00:00
Link: CVE-2019-13063
JSON object: View
NVD Information
Status : Analyzed
Published: 2019-09-23T15:15:10.637
Modified: 2019-09-23T18:48:06.143
Link: CVE-2019-13063
JSON object: View
Redhat Information
No data.
CWE