Vulnerability Description
Eibiz i-Media Server Digital Signage 3.8.0 contains a directory traversal vulnerability that allows unauthenticated remote attackers to access files outside the server's root directory. Attackers can exploit the 'oldfile' GET parameter to view sensitive configuration files like web.xml and system files such as win.ini.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Eibiz | I-Media Server Digital Signage | 3.8.0 |
Related Weaknesses (CWE)
References
- http://www.eibiz.co.thBroken Link
- https://www.exploit-db.com/exploits/48766ExploitThird Party AdvisoryVDB Entry
- https://www.vulncheck.com/advisories/eibiz-i-media-server-digital-signage-directThird Party Advisory
- https://www.zeroscience.mk/en/vulnerabilities/ZSL-2020-5585.phpExploitThird Party Advisory
- https://www.zeroscience.mk/en/vulnerabilities/ZSL-2020-5585.phpExploitThird Party Advisory
FAQ
What is CVE-2020-36893?
CVE-2020-36893 is a vulnerability with a CVSS score of 7.5 (HIGH). Eibiz i-Media Server Digital Signage 3.8.0 contains a directory traversal vulnerability that allows unauthenticated remote attackers to access files outside the server's root directory. Attackers can ...
How severe is CVE-2020-36893?
CVE-2020-36893 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-36893?
Check the references section above for vendor advisories and patch information. Affected products include: Eibiz I-Media Server Digital Signage.