Description
SpinetiX Fusion Digital Signage 3.4.8 and lower contains an authenticated path traversal vulnerability that allows attackers to manipulate file backup and deletion operations through unverified input parameters. Attackers can exploit path traversal techniques in index.php to write backup files to arbitrary locations and delete files by manipulating backup and file delete requests.
Problem types
CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Product status
Any version
Credits
LiquidWorm as Gjoko Krstic of Zero Science Lab
References
www.zeroscience.mk/en/vulnerabilities/ZSL-2020-5594.php
www.exploit-db.com/exploits/48844 (ExploitDB-48844)
www.spinetix.com (Official Product Homepage)
www.zeroscience.mk/en/vulnerabilities/ZSL-2020-5594.php (Zero Science Lab Disclosure ZSL-2020-5594)
github.com/Mbed-TLS/mbedtls (Mbed TLS GitHub Repository)
www.vulncheck.com/...ated-path-traversal-via-file-operations (VulnCheck Advisory: SpinetiX Fusion Digital Signage 3.4.8 Authenticated Path Traversal via File Operations)