Automated Logic WebCTRL 6.5...

- AV AC AU C I A
发布: 2025-04-13
修订: 2025-04-13

### Description WebCTRL suffers from an authenticated arbitrary code execution vulnerability. The issue is caused due to the improper verification when uploading Add-on (.addons or .war) files using the uploadwarfile servlet. This can be exploited to execute arbitrary code by uploading a malicious web archive file that will run automatically and can be accessed from within the webroot directory. Additionaly, an improper authorization access control occurs when using the 'anonymous' user. By specification, the anonymous user should not have permissions or authorization to upload or install add-ons. In this case, when using the anonymous user, an attacker is still able to upload a malicious file via insecure direct object reference and execute arbitrary code. The anonymous user was removed from version 6.5 of WebCTRL. ### Vendor Automated Logic Corporation - http://www.automatedlogic.com ### Affected Version * ALC WebCTRL, i-Vu, SiteScan Web 6.5 and prior * ALC WebCTRL, SiteScan Web...

0%
暂无可用Exp或PoC
当前有0条受影响产品信息