The BWOCXRUN.BwocxrunCtrl.1 control contains a method named
OpenUrlToBufferTimeout. This method takes a URL as a parameter and
returns its contents to the caller in JavaScript. The URLs are accessed
in the security context of the current browser session. The control does
not perform any URL validation and allows file:// URLs that access the
local disk.


The method can be used to open a URL (including file URLs) and read
the URLs through JavaScript. This method could also be used to reach any
arbitrary URL to which the browser has access.
Advisories
Source ID Title
EUVD EUVD EUVD-2014-0803 The BWOCXRUN.BwocxrunCtrl.1 control contains a method named OpenUrlToBufferTimeout. This method takes a URL as a parameter and returns its contents to the caller in JavaScript. The URLs are accessed in the security context of the current browser session. The control does not perform any URL validation and allows file:// URLs that access the local disk. The method can be used to open a URL (including file URLs) and read the URLs through JavaScript. This method could also be used to reach any arbitrary URL to which the browser has access.
Fixes

Solution

Advantech has created a new version (Version 7.2) that mitigates each of the vulnerabilities described above. Users may download this version from the following location at their web site:  http://webaccess.advantech.com/downloads.php?item=software For additional information about WebAccess, please visit the following Advantech web site:  http://webaccess.advantech.com/


Workaround

No workaround given by the vendor.

History

Fri, 19 Sep 2025 19:30:00 +0000

Type Values Removed Values Added
Description The OpenUrlToBufferTimeout method in the BWOCXRUN.BwocxrunCtrl.1 ActiveX control in bwocxrun.ocx in Advantech WebAccess before 7.2 allows remote attackers to read arbitrary files via a file: URL. The BWOCXRUN.BwocxrunCtrl.1 control contains a method named OpenUrlToBufferTimeout. This method takes a URL as a parameter and returns its contents to the caller in JavaScript. The URLs are accessed in the security context of the current browser session. The control does not perform any URL validation and allows file:// URLs that access the local disk. The method can be used to open a URL (including file URLs) and read the URLs through JavaScript. This method could also be used to reach any arbitrary URL to which the browser has access.
Title Advantech WebAccess File and Directory Information Exposure
Weaknesses CWE-538
References

cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-09-19T19:19:40.873Z

Reserved: 2014-01-02T00:00:00

Link: CVE-2014-0772

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2014-04-12T04:37:31.673

Modified: 2025-09-19T20:15:37.850

Link: CVE-2014-0772

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.