DataTrack System 3.5 allows remote attackers to bypass intended restrictions on file extensions, and read arbitrary files, via a trailing backslash in a URI, as demonstrated by (1) web.config\ and (2) .ascx\ files.
References
Configurations
History
21 Nov 2024, 01:15
Type | Values Removed | Values Added |
---|---|---|
References | () http://cross-site-scripting.blogspot.com/2010/05/datatrack-system-35-persistent-xss.html - Exploit | |
References | () http://packetstormsecurity.org/1005-exploits/datatrackserver35-xss.txt - Exploit | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/58735 - |
Information
Published : 2010-05-25 22:30
Updated : 2025-04-11 00:51
NVD link : CVE-2010-2079
Mitre link : CVE-2010-2079
CVE.ORG link : CVE-2010-2079
JSON object : View
Products Affected
magnoware
- datatrack_system
CWE
CWE-20
Improper Input Validation