An issue was discovered in Appnitro MachForm before 4.2.3. The module in charge of serving stored files gets the path from the database. Modifying the name of the file to serve on the corresponding ap_form table leads to a path traversal vulnerability via the download.php q parameter.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
https://metalamin.github.io/MachForm-not-0-day-EN/ | third party advisory exploit |
https://www.exploit-db.com/exploits/44804/ | exploit vdb entry third party advisory |
https://www.machform.com/blog-machform-423-security-release/ | release notes vendor advisory |