Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-q78c-pv4h-fqw6

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

LCDS LAquis SCADA through 4.3.1.1085 is vulnerable to a control bypass and path traversal. If an attacker can get a victim to load a malicious els project file and use the play feature, then the attacker can bypass a consent popup and write arbitrary files to OS locations where the user has permission, leading to code execution.

LCDS LAquis SCADA through 4.3.1.1085 is vulnerable to a control bypass and path traversal. If an attacker can get a victim to load a malicious els project file and use the play feature, then the attacker can bypass a consent popup and write arbitrary files to OS locations where the user has permission, leading to code execution.

EPSS

Процентиль: 77%
0.01076
Низкий

Дефекты

CWE-22

Связанные уязвимости

CVSS3: 7.8
nvd
больше 4 лет назад

LCDS LAquis SCADA through 4.3.1.1085 is vulnerable to a control bypass and path traversal. If an attacker can get a victim to load a malicious els project file and use the play feature, then the attacker can bypass a consent popup and write arbitrary files to OS locations where the user has permission, leading to code execution.

EPSS

Процентиль: 77%
0.01076
Низкий

Дефекты

CWE-22