Description
Xerte Online Toolkits versions 3.15 and earlier contain an information disclosure vulnerability that allows unauthenticated attackers to retrieve the full server-side filesystem path of the application root. Attackers can send a GET request to the /setup page to access the exposed root_path value rendered in the HTML response, which enables exploitation of path-dependent vulnerabilities such as relative path traversal in connector.php.
Problem types
CWE-497 Exposure of Sensitive System Information to an Unauthorized Control Sphere
Product status
3.15.0 (semver)
Any version before f063e942b4a9bf77a06829e844c2c70316bc45e8
Credits
bootstrapbool
References
github.com/bootstrapbool/xerteonlinetoolkits-rce
xerte.org.uk/xertetoolkits_3.15_ChangeLog.html
xerte.org.uk/...downloads-1/category/3-xerte-online-toolkits
github.com/thexerteproject/xerteonlinetoolkits/issues/1527
github.com/...ommit/f063e942b4a9bf77a06829e844c2c70316bc45e8
www.vulncheck.com/...line-toolkits-path-disclosure-via-setup