Advent/SSC Inc. Tamale RMS < 23.1 is vulnerable to Directory Traversal. If one traverses to the affected URL, one enumerates Contact information on the host which contains usernames, e-mail addresses, and other internal information stored within the web app.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
https://gist.github.com/barrett092/9ed092e4b14b9145f4d046556eb9dab7 | third party advisory |
https://cve.report/CVE-2023-33524 | third party advisory |
https://www.advent.com/resources/all-resources/info-kit-tamale-rms-for-asset-owners/ | product |