जमा करें #643036: erjinzhi soft 10 OA V1.0 File Path Traversalजानकारी

शीर्षकerjinzhi soft 10 OA V1.0 File Path Traversal
विवरणDuring the security review of "10OA",I discovered a critical file path traversal (directory traversal) vulnerability exists in the file.aspx endpoint under the /view/ directory of the 10OA system hosted at https://www.10oa.com. The vulnerability arises from insufficient validation and sanitization of the file query parameter. Attackers can exploit this flaw by submitting maliciously crafted file parameter values containing ../ (dot-dot-slash) sequences to traverse outside the intended file directory and access sensitive system files on the server. In this case, the vulnerability was successfully exploited to read the Windows system configuration file C:\windows\win.ini—a clear indication that the server does not restrict access to critical system paths. This flaw allows unauthorized access to sensitive files (e.g., configuration files, credentials, log data) and may lead to further server compromise if combined with other vulnerabilities.
स्रोत⚠️ https://github.com/1276486/CVE/issues/8
उपयोगकर्ता
 Zre0x1c (UID 89206)
सबमिशन28/08/2025 09:49 AM (8 महीनों पहले)
संयम11/09/2025 05:11 PM (14 days later)
स्थितिस्वीकृत
VulDB प्रविष्टि323643 [erjinzhi 10OA 1.0 /view/file.aspx Arquivo निर्देशिका ट्रैवर्सल]
अंक20

Might our Artificial Intelligence support you?

Check our Alexa App!