{"id":24951,"date":"2026-03-06T15:14:33","date_gmt":"2026-03-06T14:14:33","guid":{"rendered":"https:\/\/herolab.usd.de\/security-advisories\/usd-2025-0066\/"},"modified":"2026-03-10T10:03:40","modified_gmt":"2026-03-10T09:03:40","slug":"usd-2025-0066","status":"publish","type":"page","link":"https:\/\/herolab.usd.de\/en\/security-advisories\/usd-2025-0066\/","title":{"rendered":"usd-2025-0066"},"content":{"rendered":"<p>[et_pb_section fb_built=\"1\" _builder_version=\"4.21.0\" _module_preset=\"default\" background_color=\"#2E353D\" custom_padding=\"||0px|||\" global_colors_info=\"{}\"][et_pb_row _builder_version=\"4.25.2\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_column type=\"4_4\" _builder_version=\"4.21.0\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.27.5\" _module_preset=\"default\" custom_padding=\"||13px|||\" global_colors_info=\"{}\"]<\/p>\n<h1>usd-2025-66 | Kofax Communication Server 10.5.1 - Path Traversal<\/h1>\n<h1><\/h1>\n<p><strong>Product<\/strong>: Kofax Communication Server<br \/><strong>Affected Version<\/strong>: 10.5.1<br \/><strong>Vulnerability Type<\/strong>: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') (CWE-22)<br \/><strong>Security Risk<\/strong>: Critical<br \/><strong>Vendor<\/strong>: Tungsten Automation<br \/><strong>Vendor URL<\/strong>: <a href=\"https:\/\/www.tungstenautomation.de\/\" target=\"_blank\" rel=\"noopener\">https:\/\/www.tungstenautomation.de\/<\/a><br \/><strong>Vendor acknowledged vulnerability<\/strong>: Yes<br \/><strong>Vendor Status<\/strong>: Fixed<br \/><strong>CVE Number<\/strong>: Requested<br \/><strong>CVE Link<\/strong>: Not requested yet<br \/><strong>Advisory ID<\/strong>: usd-2025-66<\/p>\n<h3>Description<\/h3>\n<p><em>Kofax Communication Server (KCS)<\/em>, formerly known as <em>TOPCALL<\/em> is used as a message broker, mainly for TELEX messages (aerospace-specific messages that, for example, inform about airplane movements). Other message types, such as AFTN, ASCARS, SMS and FAX are supported, too.<\/p>\n<p>The web application <em>KCS Portal<\/em> allows configuration of allowed recipients and senders, viewing transmitted messages, monitoring functionality, user management, and composing messages.<\/p>\n<p>The web application is vulnerable to path traversal attacks.<\/p>\n<p>When downloading attachments from messages, the source file name as stored on the backends disk is passed as a parameter in the URL.<br \/>The <strong>srcFileName<\/strong> parameter is not validated and therefore allows attackers to specify arbitrary files including directory traversals (<strong>..\/<\/strong>) and absolute Paths (*<em>C:*<\/em>) outside the download directory.<\/p>\n<p>This vulnerability allows an attacker to read from the application's underlying file system.<br \/>By this, it is possible to retrieve configuration files, password or login information or any other files containing sensitive data.<\/p>\n<h3>Proof of Concept<\/h3>\n<p>The following request allows to download the file <strong>C:\\Windows\\win.ini<\/strong> from the application server:<\/p>\n<pre class=\"codehilite\" style=\"line-height: 125%;background: #263238;color: #eff\">GET \/kcsportal\/api\/v1\/download\/[redacted]?Kcs-ConnectionHandle=[...]&amp;srcFileName=.\/..\/..\/..\/..\/..\/..\/Windows\/win.ini&amp;destFileName=test.html HTTP\/1.1<br \/>Host: [redacted]<br \/>Cookie: [redacted]<\/pre>\n<p>The server responds with the content of the requested file:<\/p>\n<pre class=\"codehilite\" style=\"line-height: 125%;background: #263238;color: #eff\">HTTP\/1.1 200 OK<br \/>Content-Type: application\/octet-stream<br \/>Content-Disposition: attachment; <br \/>filename=test.html<br \/>[...]<br \/>; for 16-bit app support<br \/>[fonts]<br \/>[extensions]<br \/>[mci extensions]<br \/>[files]<br \/>[Mail]<br \/>MAPI=1<\/pre>\n<p>Furthermore, it is possible to specify UNC paths as source file name. If an attacker is able to run an SMB server in the adjacent network, it is possible to capture the NTLM hash of the user running the server application.<\/p>\n<h3>Fix<\/h3>\n<p>It is recommended to filter all input that is used in the context of file operations for path specifications.<br \/>Ideally, the file system of the application should be isolated, e.g., using <em>sandboxing<\/em>.<\/p>\n<h3>References<\/h3>\n<ul>\n<li><a href=\"https:\/\/owasp.org\/www-community\/attacks\/Path_Traversal\" target=\"_blank\" rel=\"noopener\">https:\/\/owasp.org\/www-community\/attacks\/Path_Traversal<\/a><\/li>\n<\/ul>\n<h3>Timeline<\/h3>\n<ul>\n<li><strong>2025-12-03<\/strong>: Vulnerabilities reported to Tungsten Automation.<\/li>\n<li><strong>2026-01-29<\/strong>: For TCS version 2025.3, the fix FR23775 is released.<\/li>\n<li><strong>2026-03-06<\/strong>: Public disclosure of this vulnerability.<\/li>\n<\/ul>\n<h3>Credits<\/h3>\n<p>This security vulnerability was identified by Dominique Dittert, Roman Hergenreder &amp; Samuel Stein of usd AG.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>usd-2025-66 | Kofax Communication Server 10.5.1 - Path Traversal Product: Kofax Communication ServerAffected Version: 10.5.1Vulnerability Type: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') (CWE-22)Security Risk: CriticalVendor: Tungsten AutomationVendor URL: https:\/\/www.tungstenautomation.de\/Vendor acknowledged vulnerability: YesVendor Status: FixedCVE Number: RequestedCVE Link: Not requested yetAdvisory ID: usd-2025-66 Description Kofax Communication Server (KCS), formerly known as [&hellip;]<\/p>\n","protected":false},"author":114,"featured_media":0,"parent":16124,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false,"footnotes":""},"class_list":["post-24951","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/pages\/24951","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/users\/114"}],"replies":[{"embeddable":true,"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/comments?post=24951"}],"version-history":[{"count":5,"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/pages\/24951\/revisions"}],"predecessor-version":[{"id":24970,"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/pages\/24951\/revisions\/24970"}],"up":[{"embeddable":true,"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/pages\/16124"}],"wp:attachment":[{"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/media?parent=24951"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}