Impact
A directory traversal flaw in ProjeQtor’s log file viewer (dynamicDialog.php) allows attackers to supply a logname parameter containing ../ sequences. The application fails to validate this input before assembling the file path, enabling an authenticated user to read arbitrary .log files that are accessible to the web server process. The primary impact is the unauthorized disclosure of potentially sensitive information stored in those log files, such as credentials, system configuration, or debug output.
Affected Systems
All ProjeQtor installations from version 7.0 up to 12.4.3, inclusive, are affected because the path traversal vulnerability resides in the dynamicDialog.php component of the ProjeQtor:ProjeQtor product. No later versions (12.4.4 and above) contain the fix.
Risk and Exploitability
The vulnerability scores 7.1 on the CVSS scale, indicating a moderate to high severity. The EPSS score is not available, and the issue is not listed in the CISA KEV catalog. Exploitation requires an attacker to have valid authentication to the ProjeQtor application, after which the attacker can craft requests to dynamicDialog.php with directory traversal payloads to read arbitrary log files. The attack vector is via the web interface, leveraging the logname request parameter. The exploitation is straightforward in environments where log files are readable by the web server process, and no additional conditions are stated in the description.
OpenCVE Enrichment