Логотип exploitDog
bind:CVE-2023-2913
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-2913

Количество 3

Количество 3

nvd логотип

CVE-2023-2913

больше 2 лет назад

An executable used in Rockwell Automation ThinManager ThinServer can be configured to enable an API feature in the HTTPS Server Settings. This feature is disabled by default. When the API is enabled and handling requests, a path traversal vulnerability exists that allows a remote actor to leverage the privileges of the server’s file system and read arbitrary files stored in it. A malicious user could exploit this vulnerability by executing a path that contains manipulating variables.

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-w54w-3cc4-mvrq

больше 2 лет назад

An executable used in Rockwell Automation ThinManager ThinServer can be configured to enable an API feature in the HTTPS Server Settings. This feature is disabled by default. When the API is enabled and handling requests, a path traversal vulnerability exists that allows a remote actor to leverage the privileges of the server’s file system and read arbitrary files stored in it. A malicious user could exploit this vulnerability by executing a path that contains manipulating variables.

CVSS3: 7.5
EPSS: Низкий
fstec логотип

BDU:2025-05641

больше 2 лет назад

Уязвимость конфигурации Enable API Endpoints компонента ThinServer платформы для централизованного управления приложениями Rockwell Automation ThinManager, позволяющая нарушителю читать произвольные файлы

CVSS3: 7.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2023-2913

An executable used in Rockwell Automation ThinManager ThinServer can be configured to enable an API feature in the HTTPS Server Settings. This feature is disabled by default. When the API is enabled and handling requests, a path traversal vulnerability exists that allows a remote actor to leverage the privileges of the server’s file system and read arbitrary files stored in it. A malicious user could exploit this vulnerability by executing a path that contains manipulating variables.

CVSS3: 7.5
0%
Низкий
больше 2 лет назад
github логотип
GHSA-w54w-3cc4-mvrq

An executable used in Rockwell Automation ThinManager ThinServer can be configured to enable an API feature in the HTTPS Server Settings. This feature is disabled by default. When the API is enabled and handling requests, a path traversal vulnerability exists that allows a remote actor to leverage the privileges of the server’s file system and read arbitrary files stored in it. A malicious user could exploit this vulnerability by executing a path that contains manipulating variables.

CVSS3: 7.5
0%
Низкий
больше 2 лет назад
fstec логотип
BDU:2025-05641

Уязвимость конфигурации Enable API Endpoints компонента ThinServer платформы для централизованного управления приложениями Rockwell Automation ThinManager, позволяющая нарушителю читать произвольные файлы

CVSS3: 7.5
0%
Низкий
больше 2 лет назад

Уязвимостей на страницу