Description
GeoVision GeoWebServer 5.3.3 contains multiple vulnerabilities including local file inclusion, cross-site scripting, and remote code execution through improper input sanitization. Attackers can exploit the WebStrings.srf endpoint by manipulating path traversal and injection parameters to access system files and execute malicious scripts.
Problem types
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Product status
Credits
Ken 's1ngular1ty' Pyle
References
www.exploit-db.com/exploits/50211 (ExploitDB-50211)
www.geovision.com.tw/cyber_security.php (GeoVision Cyber Security Page)
www.vulncheck.com/...ision-geowebserver-local-file-inclusion (VulnCheck Advisory: GeoVision Geowebserver 5.3.3 - Local FIle Inclusion)