Description
PacsOne Server version 6.6.2 (prior versions are likely affected) contains a directory traversal vulnerability within the web-based DICOM viewer component. Successful exploitation allows a remote unauthenticated attacker to read arbitrary files via the 'nocache.php' endpoint with a crafted 'path' parameter. Exploitation evidence was observed by the Shadowserver Foundation on 2025-02-02 UTC.
Problem types
CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Product status
6.6.2
Timeline
| 2018-01-28: | ExploitDB-43907 is publicly disclosed. |
| 2017-09-28: | Vendor notifies researcher of vulnerability remediation. |
Credits
Carlos Avila
References
www.exploit-db.com/exploits/43907
www.exploit-db.com/exploits/43907
pacsone.net/download.htm
www.vulncheck.com/...icom-web-viewer-directory-traversal-lfi