Directory traversal vulnerability in the web server in SpecView 2.5 build 853 and earlier allows remote attackers to read arbitrary files via a ... (dot dot dot) in a URI.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
http://aluigi.altervista.org/adv/specview_1-adv.txt | exploit |
http://www.us-cert.gov/control_systems/pdf/ICSA-13-011-02.pdf | us government resource |