SAXoPRESS suffers from a directory transversal vulnerability, allowing an attacker to read the contents of files on the server.
a2462c3295e432649925f198bb27e6366741793a57802a72f40d991a98dd619d
SAXoPRESS is a content management system, mainly used for news publishing.
A vulnerability exists in SAXoPRESS, which allows malicious users to read the contents of files on the server, and possibly execute arbitrary commands.
Example exploit:
https://example.com/apps/pbcs.dll/misc?url=../../../../../../../../../../winnt/system.ini
https://example.com/apps/pbcs.dll/misc?url=../../../../../../../../../../winnt/system32/cmd.exe
Affected versions: unconfirmed