Home

Description

The back-end does not sufficiently verify the user-controlled filename parameter which makes it possible for an attacker to perform a path traversal attack and retrieve arbitrary files from the file system.

PUBLISHED Reserved 2024-11-13 | Published 2024-11-22 | Updated 2024-11-26 | Assigner icscert




HIGH: 7.5CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

HIGH: 8.7CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-35

Product status

Default status
unaffected

Any version before 1.3
affected

Default status
unaffected

Any version before 9.2.1
affected

Credits

Michael Heinzl reported these vulnerabilities to CISA. finder

References

www.cisa.gov/news-events/ics-advisories/icsa-24-326-07

cve.org (CVE-2024-50054)

nvd.nist.gov (CVE-2024-50054)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.