Description
Ozeki SMS Gateway versions up to and including 10.3.208 contain a path traversal vulnerability. Successful exploitation allows an unauthenticated attacker to use URL-encoded traversal sequences to read arbitrary files from the underlying filesystem with the privileges of the gateway service, leading to disclosure of sensitive information.
Problem types
CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Product status
Any version
Timeline
| 2023-08-04: | ExploitDB-51646 is publicly disclosed. |
Credits
Ahmet Ümit BAYRAM
References
www.exploit-db.com/exploits/51646
ozeki-sms-gateway.com/
www.vulncheck.com/...way-unauthenticated-arbitrary-file-read