Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-q9wr-9rpv-8m6q

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью
CVSS3: 7.7

Описание

A vulnerability has been identified in SiNVR 3 Central Control Server (CCS) (all versions), SiNVR 3 Video Server (all versions). The SiNVR 3 Central Control Server (CCS) contains a directory traversal vulnerability in its XML-based communication protocol as provided by default on ports 5444/tcp and 5440/tcp. An authenticated remote attacker with network access to the CCS server could exploit this vulnerability to list arbitrary directories or read files outside of the CCS application context.

A vulnerability has been identified in SiNVR 3 Central Control Server (CCS) (all versions), SiNVR 3 Video Server (all versions). The SiNVR 3 Central Control Server (CCS) contains a directory traversal vulnerability in its XML-based communication protocol as provided by default on ports 5444/tcp and 5440/tcp. An authenticated remote attacker with network access to the CCS server could exploit this vulnerability to list arbitrary directories or read files outside of the CCS application context.

EPSS

Процентиль: 73%
0.00756
Низкий

7.7 High

CVSS3

Дефекты

CWE-22
CWE-23

Связанные уязвимости

CVSS3: 7.7
nvd
около 6 лет назад

A vulnerability has been identified in Control Center Server (CCS) (All versions < V1.5.0). The Control Center Server (CCS) contains a directory traversal vulnerability in its XML-based communication protocol as provided by default on ports 5444/tcp and 5440/tcp. An authenticated remote attacker with network access to the CCS server could exploit this vulnerability to list arbitrary directories or read files outside of the CCS application context.

EPSS

Процентиль: 73%
0.00756
Низкий

7.7 High

CVSS3

Дефекты

CWE-22
CWE-23