Логотип exploitDog
bind:CVE-2023-38122
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-38122

Количество 3

Количество 3

nvd логотип

CVE-2023-38122

почти 2 года назад

Inductive Automation Ignition OPC UA Quick Client Permissive Cross-domain Policy Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Inductive Automation Ignition. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the configuration of the web server. The issue results from the lack of appropriate Content Security Policy headers. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of SYSTEM. Was ZDI-CAN-20539.

CVSS3: 7.2
EPSS: Низкий
github логотип

GHSA-2rcm-9pw5-qh2h

почти 2 года назад

Inductive Automation Ignition OPC UA Quick Client Permissive Cross-domain Policy Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Inductive Automation Ignition. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the configuration of the web server. The issue results from the lack of appropriate Content Security Policy headers. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of SYSTEM. Was ZDI-CAN-20539.

CVSS3: 7.2
EPSS: Низкий
fstec логотип

BDU:2023-06522

почти 3 года назад

Уязвимость веб-сервера программного обеспечения для промышленной автоматизации Inductive Automation Ignition, позволяющая нарушителю обойти существующие ограничения безопасности и выполнить произвольный код

CVSS3: 7.2
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2023-38122

Inductive Automation Ignition OPC UA Quick Client Permissive Cross-domain Policy Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Inductive Automation Ignition. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the configuration of the web server. The issue results from the lack of appropriate Content Security Policy headers. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of SYSTEM. Was ZDI-CAN-20539.

CVSS3: 7.2
1%
Низкий
почти 2 года назад
github логотип
GHSA-2rcm-9pw5-qh2h

Inductive Automation Ignition OPC UA Quick Client Permissive Cross-domain Policy Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Inductive Automation Ignition. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the configuration of the web server. The issue results from the lack of appropriate Content Security Policy headers. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of SYSTEM. Was ZDI-CAN-20539.

CVSS3: 7.2
1%
Низкий
почти 2 года назад
fstec логотип
BDU:2023-06522

Уязвимость веб-сервера программного обеспечения для промышленной автоматизации Inductive Automation Ignition, позволяющая нарушителю обойти существующие ограничения безопасности и выполнить произвольный код

CVSS3: 7.2
1%
Низкий
почти 3 года назад

Уязвимостей на страницу