A path traversal vulnerability in the file download functionality was identified. This vulnerability allows unauthenticated users to download files, in the context of the application server, from the Linux server.
The vulnerability was acknowledged and fixed by SYNCPILOT within a week. We want to thank SYNCPILOT for its exemplary reaction to the vulnerability report.
CVSS Score
8.6 (CVSS v3.1)
CVSS Vector String
AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
Affected Version
LIVE CONTRACT versions 3 ≤ 5.4.11, ≤ 5.5.3, ≤ 5.6.2
Fixed Version
5.4.12, 5.5.4, 5.6.3
Credits
Felix Schmid (cirosec GmbH)
Vendor was contacted and informed about the vulnerability via email.
Initial response received from vendor. Vendor acknowledged the vulnerability.
Vendor informed us that the issue was resolved.