Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-pp6m-q8hc-23jj

Опубликовано: 22 мар. 2023
Источник: github
Github: Не прошло ревью
CVSS3: 9.8

Описание

A path traversal exists when processing a message in Rockwell Automation's ThinManager ThinServer. An unauthenticated remote attacker could potentially exploit this vulnerability to upload arbitrary files to any directory on the disk drive where ThinServer.exe is installed. The attacker could overwrite existing executable files with attacker-controlled, malicious contents, potentially causing remote code execution.

A path traversal exists when processing a message in Rockwell Automation's ThinManager ThinServer. An unauthenticated remote attacker could potentially exploit this vulnerability to upload arbitrary files to any directory on the disk drive where ThinServer.exe is installed. The attacker could overwrite existing executable files with attacker-controlled, malicious contents, potentially causing remote code execution.

EPSS

Процентиль: 98%
0.62912
Средний

9.8 Critical

CVSS3

Дефекты

CWE-22

Связанные уязвимости

CVSS3: 9.8
nvd
почти 3 года назад

In affected versions, a path traversal exists when processing a message in Rockwell Automation's ThinManager ThinServer. An unauthenticated remote attacker could potentially exploit this vulnerability to upload arbitrary files to any directory on the disk drive where ThinServer.exe is installed. The attacker could overwrite existing executable files with attacker-controlled, malicious contents, potentially causing remote code execution.

CVSS3: 9.8
fstec
почти 3 года назад

Уязвимость исполняемого файла ThinServer.exe платформы для централизованного управления приложениямия Rockwell Automation ThinManager, позволяющая нарушителю перезаписать произвольные файлы и выполнить произвольный код

EPSS

Процентиль: 98%
0.62912
Средний

9.8 Critical

CVSS3

Дефекты

CWE-22