Path traversal in SmartVista Cardgen version 3.28.0 (CVE-2022-38613)
CVE-2022-38613
Exploit Title: Path traversal in SmartVista Cardgen version 3.28.0
Exploit Author: Tin Pham aka TF1T of VietSunshine Cyber Security Services
Vendor Homepage: https://www.bpcbt.com/smartvista-solutions/
Affected Version(s): SmartVista Cardgen version 3.28.0
Description: A Path Traversal vulnerability in SmartVista Cardgen v3.28.0 allows authenticated attackers to read arbitrary files in the system.
Steps to reproduce:
- Step 1: At menu System -> System Directories, an authenticated user can add/modify a row with specific directory in "path" parameter. For Example, we have SERVICE with value "temp" and DIRECTORY with value "temp", we modify its PATH to "/etc/"
- Step 2: At /svcl/download, we set "serviceType" parameter to "temp", "directory" parameter to "temp", fileName parameter to "passwd", we can read the content of /etc/passwd file
Raw request/response
Last updated