Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-5g96-3868-4x48

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

An exploitable regular expression without anchors vulnerability exists in the Web-Based Management (WBM) authentication functionality of WAGO PFC200 versions 03.00.39(12) and 03.01.07(13), and WAGO PFC100 version 03.00.39(12). A specially crafted authentication request can bypass regular expression filters, resulting in sensitive information disclosure.

An exploitable regular expression without anchors vulnerability exists in the Web-Based Management (WBM) authentication functionality of WAGO PFC200 versions 03.00.39(12) and 03.01.07(13), and WAGO PFC100 version 03.00.39(12). A specially crafted authentication request can bypass regular expression filters, resulting in sensitive information disclosure.

EPSS

Процентиль: 51%
0.00284
Низкий

Связанные уязвимости

CVSS3: 7.5
nvd
почти 6 лет назад

An exploitable regular expression without anchors vulnerability exists in the Web-Based Management (WBM) authentication functionality of WAGO PFC200 versions 03.00.39(12) and 03.01.07(13), and WAGO PFC100 version 03.00.39(12). A specially crafted authentication request can bypass regular expression filters, resulting in sensitive information disclosure.

EPSS

Процентиль: 51%
0.00284
Низкий