Description
Multiple directory traversal vulnerabilities in Xangati XSR before 11 and XNR before 7 allow remote attackers to read arbitrary files via a .. (dot dot) in (1) the file parameter in a getUpgradeStatus action to servlet/MGConfigData, (2) the download parameter in a download action to servlet/MGConfigData, (3) the download parameter in a port_svc action to servlet/MGConfigData, (4) the file parameter in a getfile action to servlet/Installer, or (5) the binfile parameter to servlet/MGConfigData.
Exploits (3)
exploitdb
WORKING POC
VERIFIED
by Jan Kadijk · textwebappsjsp
https://www.exploit-db.com/exploits/39142
exploitdb
WORKING POC
VERIFIED
by Jan Kadijk · textwebappsjsp
https://www.exploit-db.com/exploits/39143
exploitdb
WORKING POC
VERIFIED
by Jan Kadijk · textwebappscgi
https://www.exploit-db.com/exploits/39145
References (1)
Core 1
Core References
US Government Resource third-party-advisory
x_refsource_cert-vn
http://www.kb.cert.org/vuls/id/657622
Scores
EPSS
0.1198
EPSS Percentile
93.8%
Details
CWE
CWE-22
Status
published
Products (2)
xangati/xangati_software_release
xangati/xangati_xnr
Published
Apr 15, 2014
Tracked Since
Feb 18, 2026