Описание
Some commands used by the Rockwell Automation ISaGRAF Runtime Versions 4.x and 5.x eXchange Layer (IXL) protocol perform various file operations in the file system. Since the parameter pointing to the file name is not checked for reserved characters, it is possible for a remote, unauthenticated attacker to traverse an application’s directory, which could lead to remote code execution.
Ссылки
- MitigationVendor Advisory
- Permissions Required
- Third Party AdvisoryUS Government Resource
- Third Party Advisory
- MitigationVendor Advisory
- Permissions Required
- Third Party AdvisoryUS Government Resource
- Third Party Advisory
Уязвимые конфигурации
Одновременно
Одновременно
Одновременно
Одновременно
Одно из
Одновременно
Одновременно
Одно из
Одновременно
Одновременно
Одно из
Одно из
Одновременно
Одновременно
Одновременно
Одновременно
Одновременно
EPSS
9.1 Critical
CVSS3
9.8 Critical
CVSS3
9.3 Critical
CVSS2
Дефекты
Связанные уязвимости
Some commands used by the Rockwell Automation ISaGRAF Runtime Versions 4.x and 5.x eXchange Layer (IXL) protocol perform various file operations in the file system. Since the parameter pointing to the file name is not checked for reserved characters, it is possible for a remote, unauthenticated attacker to traverse an application’s directory, which could lead to remote code execution.
Уязвимость компонента eXchange Layer (IXL) среды разработки приложений для программируемых логических контроллеров ISaGRAF Runtime Rockwell Automation, позволяющая нарушителю выполнить произвольный код
EPSS
9.1 Critical
CVSS3
9.8 Critical
CVSS3
9.3 Critical
CVSS2