A vulnerability, which was classified as problematic, was found in ProjectSend r754. This affects an unknown part of the file process.php?do=zip_download. The manipulation of the argument client/file leads to information disclosure. It is possible to initiate the attack remotely.
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
The system's authorization functionality does not prevent one user from gaining access to another user's data or record by modifying the key value identifying the data.
Link | Tags |
---|---|
http://seclists.org/fulldisclosure/2017/Feb/58 | mailing list third party advisory exploit |
https://youtu.be/Xc6Jg9I7Pj4 | third party advisory exploit |
https://vuldb.com/?id.97275 | third party advisory |