Directory traversal vulnerability in jretest.html in WebConnect 6.5 and 6.4.4, and possibly earlier versions, allows remote attackers to read keys within arbitrary INI formatted files via "..//" sequences in the WCP_USER parameter.
http://www.kb.cert.org/vuls/id/JSHA-69HVPK
http://www.kb.cert.org/vuls/id/628411
https://exchange.xforce.ibmcloud.com/vulnerabilities/19394
http://secunia.com/advisories/14006/
http://marc.info/?l=bugtraq&m=110910838600145&w=2
Source: Mitre, NVD
Published: 2004-12-31
Updated: 2025-04-03
Base Score: 5
Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N
Severity: Medium
Base Score: 7.5
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Severity: High
EPSS: 0.22387