Lucene search

K
prionPRIOn knowledge basePRION:CVE-2022-38731
HistoryFeb 16, 2023 - 2:15 p.m.

Directory traversal

2023-02-1614:15:00
PRIOn knowledge base
www.prio-n.com
1
qaelum dose
directory traversal
loadimages parameter
content-type
unc path
authentication

4.9 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

27.4%

Qaelum DOSE 18.08 through 21.1 before 21.2 allows Directory Traversal via the loadimages name parameter. It allows a user to specify an arbitrary location on the server’s filesystem from which to load an image. (Only images are displayed to the attacker. All other files are loaded but not displayed.) The Content-Type response header reflects the actual content type of the file being requested. This allows an attacker to enumerate files on the local system. Additionally, remote resources can be requested via a UNC path, allowing an attacker to coerce authentication out from the server to the attackers machine.

CPENameOperatorVersion
dosege18.08
doselt21.2

4.9 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

27.4%

Related for PRION:CVE-2022-38731