DataWizard WebXQ server could be led to traverse directories and possibly reveal files outside of the web root.
By including '/../' sequences along with a known file or directory in requested URLs, a remote user can obtain read access to the requested directories and files outside the web root, potentially compromising the privacy of user data and/or obtaining information which could be used to further compromise the host.
WebXQ Server contains a flaw that allows a remote attacker to access arbitrary files outside of the web path. The issue is due to the server not properly sanitizing user input, specifically traversal style attacks (../../) supplied via the URI.
Upgrade to version 2.1.205 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.