Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-fg53-m5qv-8qwq

Опубликовано: 19 мар. 2022
Источник: github
Github: Не прошло ревью
CVSS3: 9.8

Описание

Some commands used by the Rockwell Automation ISaGRAF Runtime Versions 4.x and 5.x eXchange Layer (IXL) protocol perform various file operations in the file system. Since the parameter pointing to the file name is not checked for reserved characters, it is possible for a remote, unauthenticated attacker to traverse an application’s directory, which could lead to remote code execution.

Some commands used by the Rockwell Automation ISaGRAF Runtime Versions 4.x and 5.x eXchange Layer (IXL) protocol perform various file operations in the file system. Since the parameter pointing to the file name is not checked for reserved characters, it is possible for a remote, unauthenticated attacker to traverse an application’s directory, which could lead to remote code execution.

EPSS

Процентиль: 85%
0.02615
Низкий

9.8 Critical

CVSS3

Дефекты

CWE-22

Связанные уязвимости

CVSS3: 9.1
nvd
почти 4 года назад

Some commands used by the Rockwell Automation ISaGRAF Runtime Versions 4.x and 5.x eXchange Layer (IXL) protocol perform various file operations in the file system. Since the parameter pointing to the file name is not checked for reserved characters, it is possible for a remote, unauthenticated attacker to traverse an application’s directory, which could lead to remote code execution.

CVSS3: 9.8
fstec
больше 4 лет назад

Уязвимость компонента eXchange Layer (IXL) среды разработки приложений для программируемых логических контроллеров ISaGRAF Runtime Rockwell Automation, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 85%
0.02615
Низкий

9.8 Critical

CVSS3

Дефекты

CWE-22