[原文]E-Business Designer (eBD) 3.1.4 and earlier allows remote attackers to obtain the full path of the web server via "'" characters, and possibly other invalid values, in (1) the id parameter to form_grupo.html, or requests to the (2) archivos/ and (3) files/ directories. NOTE: this issue might be resultant from SQL injection.
Pedro Andújar is credited with the discovery of these vulnerabilities.
Oasyssoft eBusiness Designer 0
E-Business Designer is prone to multiple input-validation vulnerabilities. The issues include remote file include, remote command execution, cross-site scripting, and SQL-injection vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input.
A successful exploit of these vulnerabilities could allow an attacker to compromise the application, access or modify data, steal cookie-based authentication credentials, execute remote PHP code in the context of the webserver process, access sensitive information, or exploit vulnerabilities in the underlying database implementation. Other attacks are also possible.
Versions 3.1.4 and prior are vulnerable; other versions may also be affected.
Attackers can exploit these issues via a web client and a network-monitoring tool.
The vendor has released a patch to address this issue.