The default configuration of Aquaforest TIFF Server allows access to arbitrary file paths, subject to any restrictions imposed by Internet Information Services (IIS) or Microsoft Windows. Depending on how a web application uses and configures TIFF Server, a remote attacker may be able to enumerate files or directories, traverse directories, bypass authentication, or access restricted files.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
https://www.aquaforest.com/blog/tiff-server-security-update | vendor advisory |
https://www.aquaforest.com/blog/aquaforest-tiff-server-sunsetting | product vendor advisory |
https://www.aquaforest.com/wp-content/uploads/pdf/ts/TiffServer4.2.pdf | product |
https://github.com/qwell/disorder-in-the-court/blob/main/README-TylerTechnologies.md | third party advisory exploit |
https://www.cisa.gov/news-events/alerts/2023/11/30/multiple-vulnerabilities-affecting-web-based-court-case-and-document-management-systems | government resource third party advisory us government resource |