Revive Adserver before 3.2.5 and 4.0.0 suffers from Reflected File Download. `www/delivery/asyncspc.php` was vulnerable to the fairly new Reflected File Download (RFD) web attack vector that enables attackers to gain complete control over a victim's machine by virtually downloading a file from a trusted domain.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Software security is not security software. Here we're concerned with topics like authentication, access control, confidentiality, cryptography, and privilege management.
Link | Tags |
---|---|
https://github.com/revive-adserver/revive-adserver/commit/69aacbd2 | third party advisory patch |
https://hackerone.com/reports/148745 | permissions required |
https://www.revive-adserver.com/security/revive-sa-2016-002/ | patch vendor advisory |