### [CVE-2019-3474](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3474) ![](https://img.shields.io/static/v1?label=Product&message=Filr&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=33.0%20Security%20Update%206%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Path%20traversal%20%5BCWE-22%5D&color=brighgreen) ### Description A path traversal vulnerability in the web application component of Micro Focus Filr 3.x allows a remote attacker authenticated as a low privilege user to download arbitrary files from the Filr server. This vulnerability affects all versions of Filr 3.x prior to Security Update 6. ### POC #### Reference - https://www.exploit-db.com/exploits/46450/ - https://www.exploit-db.com/exploits/46450/ #### Github No PoCs found on GitHub currently.