Description
QiHang Media Web Digital Signage 3.0.9 contains an unauthenticated file disclosure vulnerability that allows remote attackers to access sensitive files through unverified 'filename' and 'path' parameters. Attackers can exploit the QH.aspx endpoint to read arbitrary files and directory contents without authentication by manipulating download and getAll actions.
Problem types
CWE-530: Exposure of Backup File to an Unauthorized Control Sphere
Product status
3.0.9.0
Credits
LiquidWorm as Gjoko Krstic of Zero Science Lab
References
www.exploit-db.com/exploits/48750
www.zeroscience.mk/en/vulnerabilities/ZSL-2020-5581.php
www.exploit-db.com/exploits/48750 (ExploitDB-48750)
www.howfor.com (Official Product Homepage)
www.zeroscience.mk/en/vulnerabilities/ZSL-2020-5581.php (Vendor Security Advisory for ZSL-2020-5581)
www.vulncheck.com/...authenticated-arbitrary-file-disclosure (VulnCheck Advisory: QiHang Media Web Digital Signage 3.0.9 Unauthenticated Arbitrary File Disclosure)