Eibiz i-Media Server Digital Signage 3.8.0 contains a directory traversal vulnerability that allows unauthenticated remote attackers to access files outside the server's root directory. Attackers can exploit the 'oldfile' GET parameter to view sensitive configuration files like web.xml and system files such as win.ini.
References
| Link | Resource |
|---|---|
| http://www.eibiz.co.th | Broken Link |
| https://www.exploit-db.com/exploits/48766 | Exploit Third Party Advisory VDB Entry |
| https://www.vulncheck.com/advisories/eibiz-i-media-server-digital-signage-directory-traversal-vulnerability | Third Party Advisory |
| https://www.zeroscience.mk/en/vulnerabilities/ZSL-2020-5585.php | Exploit Third Party Advisory |
| https://www.zeroscience.mk/en/vulnerabilities/ZSL-2020-5585.php | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2025-12-10 21:16
Updated : 2025-12-17 19:26
NVD link : CVE-2020-36893
Mitre link : CVE-2020-36893
CVE.ORG link : CVE-2020-36893
JSON object : View
Products Affected
eibiz
- i-media_server_digital_signage
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
