CVE-2018-10201
Summary
| CVE | CVE-2018-10201 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2018-04-20 08:29:00 UTC |
| Updated | 2018-05-16 01:29:00 UTC |
| Description | An issue was discovered in NcMonitorServer.exe in NC Monitor Server in NComputing vSpace Pro 10 and 11. It is possible to read arbitrary files outside the root directory of the web server. This vulnerability could be exploited remotely by a crafted URL without credentials, with .../ or ...\ or ..../ or ....\ as a directory-traversal pattern to TCP port 8667. |
Risk And Classification
Problem Types: CWE-22
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Ncomputing | Vspace Pro | 10 | All | All | All |
| Application | Ncomputing | Vspace Pro | 11 | All | All | All |
| Application | Ncomputing | Vspace Pro | 10 | All | All | All |
| Application | Ncomputing | Vspace Pro | 11 | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Blog de Seguridad | MISC | www.kwell.net | Third Party Advisory |
| Ncomputing vSpace Pro 10/11 - Directory Traversal - Windows webapps Exploit | EXPLOIT-DB | www.exploit-db.com | Exploit, Third Party Advisory, VDB Entry |
| CVE-2018-10201 – Ncomputing vSpace Pro Directory Traversal Vulnerability | Kwell – Blog de Seguridad | MISC | www.kwell.net | Exploit, Third Party Advisory |
| POPUP | CONFIRM | support.ncomputing.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.