Directory traversal vulnerability in the Runtime Toolkit in CODESYS Runtime System 2.3.x and 2.4.x allows remote attackers to read, overwrite, or create arbitrary files via a .. (dot dot) in a request to the TCP listener service.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
21 Nov 2024, 01:45
Type | Values Removed | Values Added |
---|---|---|
References | () http://ics-cert.us-cert.gov/advisories/ICSA-14-084-01 - US Government Resource | |
References | () http://www.codesys.com/news-events/press-releases/detail/article/sicherheitsluecke-in-codesys-v23-laufzeitsystem.html - Vendor Advisory | |
References | () http://www.digitalbond.com/tools/basecamp/3s-codesys/ - | |
References | () http://www.securityfocus.com/bid/56300 - | |
References | () http://www.us-cert.gov/control_systems/pdf/ICSA-13-011-01.pdf - US Government Resource |
Information
Published : 2013-01-21 21:55
Updated : 2024-11-21 01:45
NVD link : CVE-2012-6069
Mitre link : CVE-2012-6069
CVE.ORG link : CVE-2012-6069
JSON object : View
Products Affected
3s-software
- codesys_runtime_system
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')