Butor Portal before 1.0.27 is affected by a Path Traversal vulnerability leading to a pre-authentication arbitrary file download. Effectively, a remote anonymous user can download any file on servers running Butor Portal. WhiteLabelingServlet is responsible for this vulnerability. It does not properly sanitize user input on the theme t parameter before reusing it in a path. This path is then used without validation to fetch a file and return its raw content to the user via the /wl?t=../../...&h= substring followed by a filename.
References
Configurations
History
No history.
Information
Published : 2019-10-02 16:15
Updated : 2024-11-21 04:24
NVD link : CVE-2019-13343
Mitre link : CVE-2019-13343
CVE.ORG link : CVE-2019-13343
JSON object : View
Products Affected
butor
- portal
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')