### [CVE-2019-8925](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8925) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description An issue was discovered in Zoho ManageEngine Netflow Analyzer Professional 7.0.0.2. An Absolute Path Traversal vulnerability in the Administration zone, in /netflow/servlet/CReportPDFServlet (via the parameter schFilePath), allows remote authenticated users to bypass intended SecurityManager restrictions and list a parent directory via any file name, such as a schFilePath=C:\boot.ini value. ### POC #### Reference - http://packetstormsecurity.com/files/151757/Zoho-ManageEngine-Netflow-Analyzer-Professional-7.0.0.2-Traversal-XSS.html - http://packetstormsecurity.com/files/151757/Zoho-ManageEngine-Netflow-Analyzer-Professional-7.0.0.2-Traversal-XSS.html - http://seclists.org/fulldisclosure/2019/Feb/45 - http://seclists.org/fulldisclosure/2019/Feb/45 - https://www.exploit-db.com/exploits/46425/ - https://www.exploit-db.com/exploits/46425/ #### Github No PoCs found on GitHub currently.