Path Traversal Vulnerability in ExpressVPN on Windows

Path Traversal Vulnerability in ExpressVPN on Windows

CVE-2018-15490 · MEDIUM Severity

AV:L/AC:L/AU:N/C:C/I:C/A:N

An issue was discovered in ExpressVPN on Windows. The Xvpnd.exe process (which runs as a service with SYSTEM privileges) listens on TCP port 2015, which is used as an RPC interface for communication with the client side of the ExpressVPN application. A JSON-RPC protocol over HTTP is used for communication. The JSON-RPC XVPN.GetPreference and XVPN.SetPreference methods are vulnerable to path traversal, and allow reading and writing files on the file system on behalf of the service.

Learn more about our Web Application Penetration Testing UK.