CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
Lifecycle Timeline
3Tags
Description
An issue was discovered in Biztalk360 through 11.5. because of mishandling of user-provided input in a path to be read by the server, a Super User attacker is able to read files on the system and/or coerce an authentication from the service, aka Directory Traversal.
Analysis
Biztalk360 through version 11.5 contains a directory traversal vulnerability allowing Super User attackers to read arbitrary files on the system and coerce authentication from the service through mishandled user input in file path parameters. The vulnerability enables local file access and potential credential extraction by authenticated administrators with Super User privileges.
Technical Context
The vulnerability stems from inadequate input validation and sanitization of file path parameters processed by the Biztalk360 server. The application fails to properly constrain or normalize user-supplied path inputs before performing file system operations, allowing attackers to traverse the directory structure using path traversal sequences (such as ../ or absolute path specifications). This is a classic path traversal vulnerability (related to improper input validation in file operations) where the server directly uses attacker-controlled path data without implementing proper canonicalization or access boundary checks. Biztalk360 is a monitoring and management platform for Microsoft BizTalk Server environments, making file system access particularly sensitive as it may expose configuration files, credentials, or other sensitive operational data.
Affected Products
Biztalk360 versions through and including 11.5 are affected by this vulnerability. The CPE data provided (cpe:2.3:a:n/a:n/a:*:*:*:*:*:*:*:*) is not vendor-specific and does not accurately reflect the affected product; however, based on the description, the scope includes Biztalk360 from initial affected versions up to and including release 11.5. Organizations running any version of Biztalk360 at or below 11.5 should be considered at risk. Consult the Synacktiv advisory linked in references for version-specific impact assessment.
Remediation
Upgrade Biztalk360 to a version released after 11.5 that includes fixes for directory traversal input validation. No specific patched version number is provided in available data; however, vendors typically release patched builds shortly after vulnerability disclosure. Contact Biztalk360 support or review the official security advisory at https://www.synacktiv.com/en/advisories/remote-code-execution-from-any-domain-account-in-biztalk360 for the exact recommended upgrade path. As an interim mitigation, restrict Super User account access to only those administrators who require it, enforce principle of least privilege, monitor file access patterns for suspicious traversal attempts, and implement network-level access controls to limit direct exposure of Biztalk360 administrative interfaces to trusted networks only.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-209203