Learn about CVE-2020-9353 affecting SmartClient 12.0, allowing unauthenticated Local File Inclusion. Find mitigation steps and long-term security practices here.
SmartClient 12.0 is affected by an unauthenticated Local File Inclusion vulnerability via directory-traversal sequences in the elem XML element.
Understanding CVE-2020-9353
SmartClient 12.0's console functionality on specific URLs is vulnerable to unauthenticated Local File Inclusion.
What is CVE-2020-9353?
The issue in SmartClient 12.0 allows attackers to include local files via directory-traversal sequences in specific parameters.
The Impact of CVE-2020-9353
Technical Details of CVE-2020-9353
SmartClient 12.0's vulnerability is detailed below:
Vulnerability Description
The Remote Procedure Call (RPC) loadFile on certain URLs allows unauthenticated Local File Inclusion via directory-traversal sequences.
Affected Systems and Versions
Exploitation Mechanism
Attackers can exploit the vulnerability by manipulating the elem XML element in the _transaction parameter.
Mitigation and Prevention
Steps to mitigate and prevent exploitation of CVE-2020-9353:
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates