Due to improper restriction, attackers could retrieve and read system files of the underlying server through the XML interface.
Due to improper restriction, attackers could retrieve and read system files of the underlying server through the XML interface.