Step 1: Target Identification: The attacker identifies a system running SunView (SunTools) with the selection_svc service exposed, likely through port scanning or service enumeration.
Step 2: Crafting the Malicious Request: The attacker crafts a malicious request to the selection_svc service. This request includes a specially crafted file path, such as /etc/passwd or other sensitive files.
Step 3: Request Submission: The attacker sends the malicious request to the vulnerable system.
Step 4: Vulnerability Trigger: The selection_svc service processes the request, failing to validate the provided file path.
Step 5: File Reading: The service, due to the lack of input validation, reads the contents of the specified file (e.g., /etc/passwd).
Step 6: Data Exfiltration: The service returns the contents of the requested file to the attacker, enabling them to gain unauthorized access to sensitive information.