Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-5x7j-64fm-ggfp

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The web server in ABB Telephone Gateway TG/S 3.2 and Busch-Jaeger 6186/11 Telefon-Gateway allows access to different endpoints of the application without authenticating by accessing a specific uniform resource locator (URL) , violating the access-control (ACL) rules. This issue allows obtaining sensitive information that may aid in further attacks and privilege escalation.

The web server in ABB Telephone Gateway TG/S 3.2 and Busch-Jaeger 6186/11 Telefon-Gateway allows access to different endpoints of the application without authenticating by accessing a specific uniform resource locator (URL) , violating the access-control (ACL) rules. This issue allows obtaining sensitive information that may aid in further attacks and privilege escalation.

EPSS

Процентиль: 47%
0.00241
Низкий

Дефекты

CWE-306

Связанные уязвимости

CVSS3: 9.1
nvd
почти 6 лет назад

The web server in ABB Telephone Gateway TG/S 3.2 and Busch-Jaeger 6186/11 Telefon-Gateway allows access to different endpoints of the application without authenticating by accessing a specific uniform resource locator (URL) , violating the access-control (ACL) rules. This issue allows obtaining sensitive information that may aid in further attacks and privilege escalation.

EPSS

Процентиль: 47%
0.00241
Низкий

Дефекты

CWE-306