CVE-2026-1330

7.5 HIGH

📋 TL;DR

MeetingHub software from HAMASTAR Technology contains an absolute path traversal vulnerability that allows unauthenticated remote attackers to read arbitrary files on the system. This affects all organizations using vulnerable versions of MeetingHub, potentially exposing sensitive system files and configuration data.

💻 Affected Systems

Products:
  • MeetingHub
Versions: All versions prior to 2026.1.1
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the file download functionality and affects all default installations.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could download critical system files like /etc/passwd, /etc/shadow, configuration files, database credentials, or sensitive application data, leading to complete system compromise.

🟠

Likely Case

Attackers will exfiltrate sensitive configuration files, user data, and system information that can be used for further attacks or data theft.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to the application server's file system, though sensitive data may still be exposed.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability is simple to exploit using path traversal sequences like '../../' in file download requests.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2026.1.1

Vendor Advisory: https://www.twcert.org.tw/en/cp-139-10651-ff09c-2.html

Restart Required: Yes

Instructions:

1. Download MeetingHub version 2026.1.1 from HAMASTAR Technology. 2. Backup current installation and data. 3. Stop MeetingHub service. 4. Install the new version. 5. Restart MeetingHub service. 6. Verify functionality.

🔧 Temporary Workarounds

Network Access Restriction

all

Restrict access to MeetingHub to trusted IP addresses only

Web Application Firewall Rules

all

Block path traversal patterns in HTTP requests

🧯 If You Can't Patch

  • Isolate MeetingHub server in a restricted network segment
  • Implement strict file system permissions and disable unnecessary file access

🔍 How to Verify

Check if Vulnerable:

Attempt to access a system file using path traversal in MeetingHub's file download endpoint (e.g., request '../../../../etc/passwd')

Check Version:

Check MeetingHub admin interface or application logs for version information

Verify Fix Applied:

After patching, attempt the same path traversal attack - it should return an error or be blocked

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests containing '../' sequences
  • Unusual file access patterns from external IPs
  • Failed authentication attempts followed by file download requests

Network Indicators:

  • Multiple requests for system files from single IP
  • Patterns of '../../' in URL parameters
  • Unusual outbound data transfers

SIEM Query:

source="meetinghub.logs" AND (url="*../*" OR url="*..\\*" OR url="*%2e%2e%2f*")

🔗 References

📤 Share & Export