// For flags

CVE-2019-13343

 

Severity Score

7.5
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

2
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Butor Portal before 1.0.27 is affected by a Path Traversal vulnerability leading to a pre-authentication arbitrary file download. Effectively, a remote anonymous user can download any file on servers running Butor Portal. WhiteLabelingServlet is responsible for this vulnerability. It does not properly sanitize user input on the theme t parameter before reusing it in a path. This path is then used without validation to fetch a file and return its raw content to the user via the /wl?t=../../...&h= substring followed by a filename.

Butor Portal versiones anteriores a 1.0.27, está afectado por una vulnerabilidad de Salto de Ruta conllevando a una descarga de archivos arbitrarios previa a la autenticación. Efectivamente, un usuario anónimo remoto puede descargar cualquier archivo en servidores ejecutando Butor Portal. La función WhiteLabelingServlet es responsable de esta vulnerabilidad. No sanea apropiadamente la entrada del usuario en el parámetro t del tema antes de reutilizarlo en una ruta. Esta ruta luego es usada sin comprobación para recuperar un archivo y devolver su contenido crudo para el usuario por medio de la subcadena /wl?t=../../...&h= seguida por un nombre de archivo.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
High
Availability
None
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
Low
Availability
Low
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
Low
Availability
Low
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
None
Integrity
Partial
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2019-07-05 CVE Reserved
  • 2019-10-02 CVE Published
  • 2024-08-04 CVE Updated
  • 2024-08-04 First Exploit
  • 2024-09-25 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Butor
Search vendor "Butor"
Portal
Search vendor "Butor" for product "Portal"
< 1.0.27
Search vendor "Butor" for product "Portal" and version " < 1.0.27"
-
Affected