Description
VideoFlow Digital Video Protection DVP 2.10 contains an authenticated directory traversal vulnerability that allows authenticated attackers to disclose arbitrary files by injecting path traversal sequences in the ID parameter. Attackers can submit requests to downloadsys.pl, download_xml.pl, download.pl, downloadmib.pl, or downloadFile.pl with directory traversal payloads to read sensitive system files like /etc/passwd.
Problem types
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Product status
1.40.0.15
2.10.0.5
Credits
LiquidWorm as Gjoko Krstic of Zero Science Lab
References
www.exploit-db.com/exploits/44386 (ExploitDB-44386)
www.zeroscience.mk/en/vulnerabilities/ZSL-2018-5454.php (Vulnerability Advisory)
www.vulncheck.com/...directory-traversal-x-prototype-version (VulnCheck Advisory: VideoFlow Digital Video Protection DVP 10 Authenticated Directory Traversal 2.10 (X-Prototype-Version: 1.6.0.2))