Impact
The vulnerability is in an unknown function of the file LayerImageController.Submit.cs within the layerImage Endpoint of SSCMS 4.7.0. By manipulating the filePaths argument, an attacker can perform directory traversal, allowing reading of arbitrary files outside the intended directory. This remote path traversal flaw (CWE‑22) can expose sensitive server data and may be used as a pivot for further attacks. The exploit can be triggered remotely via HTTP requests to the public endpoint.
Affected Systems
SSC Network Management System (SSCMS) version 4.7.0 is affected. No other versions are explicitly listed, so systems running this exact release should evaluate their exposure.
Risk and Exploitability
The CVSS score of 5.3 designates the problem as moderate severity. The EPSS score is below 1%, indicating a low probability of exploitation, and the vulnerability is not listed in CISA’s KEV catalog. Attackers can trigger the flaw remotely by sending crafted requests to the layerImage endpoint; if successful, they can read files outside the intended directory. The risk is that sensitive configuration or credential files may be disclosed, and the exposed endpoint could be used for additional lateral movements.
OpenCVE Enrichment