Butor Portal before 1.0.27 is affected by a Path Traversal vulnerability leading to a pre-authentication arbitrary file download. Effectively, a remote anonymous user can download any file on servers running Butor Portal. WhiteLabelingServlet is responsible for this vulnerability. It does not properly sanitize user input on the theme t parameter before reusing it in a path. This path is then used without validation to fetch a file and return its raw content to the user via the /wl?t=../../...&h= substring followed by a filename.
[
{
"digest": {
"line_hashes": [
"258212608843229262247361505895702871892",
"178147678383434021193724111240360665528",
"298303949428613447334701423945072506860",
"230145181926896130479237155499623611097",
"218106648773736913122202914461757495194",
"157252327876678578555298930454655562804",
"315154663657932694346084968733643448105",
"137450595319267565534451463980117174848"
],
"threshold": 0.9
},
"signature_type": "Line",
"deprecated": false,
"signature_version": "v1",
"target": {
"file": "src/main/java/com/butor/portal/web/servlet/WhiteLabelingServlet.java"
},
"id": "CVE-2019-13343-3002fc52",
"source": "https://bitbucket.org/butor-team/portal@cd7055d33e194fcf530100ee1d8d13aa9cde230b"
},
{
"digest": {
"function_hash": "274076426177737951096722083256556587546",
"length": 2604.0
},
"signature_type": "Function",
"deprecated": false,
"signature_version": "v1",
"target": {
"file": "src/main/java/com/butor/portal/web/servlet/WhiteLabelingServlet.java",
"function": "service"
},
"id": "CVE-2019-13343-5450f3f6",
"source": "https://bitbucket.org/butor-team/portal@cd7055d33e194fcf530100ee1d8d13aa9cde230b"
}
]