Untriaged
Permalink
CVE-2019-25355
7.5 HIGH
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): NONE
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): HIGH
- Integrity impact (I): NONE
- Availability impact (A): NONE
Genivia gSOAP 2.8 - 'gSOAP' Path Traversal
gSOAP 2.8 contains a directory traversal vulnerability that allows unauthenticated attackers to access system files by manipulating HTTP path traversal techniques. Attackers can retrieve sensitive files like /etc/passwd by sending crafted GET requests with multiple '../' directory traversal sequences.
References
- ExploitDB-47653 exploit
- Vendor Homepage product
- Product Details Page product
- VulnCheck Advisory: Genivia gSOAP 2.8 - 'gSOAP' Path Traversal third-party-advisory
Affected products
gSOAP
- ==2.8
Package maintainers
-
@bjornfor Bjørn Forsman <bjorn.forsman@gmail.com>