Absolute path traversal vulnerability in the download feature in FileDownloadServlet in GE Digital Energy MDS PulseNET and MDS PulseNET Enterprise before 3.1.5 allows remote attackers to read or delete arbitrary files via a full pathname.
References
Link | Resource |
---|---|
http://www.gedigitalenergy.com/app/resources.aspx?prod=pulsenet&type=9 | Vendor Advisory |
http://zerodayinitiative.com/advisories/ZDI-15-439/ | |
https://ics-cert.us-cert.gov/advisories/ICSA-15-258-03 | Third Party Advisory US Government Resource |
http://www.gedigitalenergy.com/app/resources.aspx?prod=pulsenet&type=9 | Vendor Advisory |
http://zerodayinitiative.com/advisories/ZDI-15-439/ | |
https://ics-cert.us-cert.gov/advisories/ICSA-15-258-03 | Third Party Advisory US Government Resource |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:35
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.gedigitalenergy.com/app/resources.aspx?prod=pulsenet&type=9 - Vendor Advisory | |
References | () http://zerodayinitiative.com/advisories/ZDI-15-439/ - | |
References | () https://ics-cert.us-cert.gov/advisories/ICSA-15-258-03 - Third Party Advisory, US Government Resource |
Information
Published : 2015-09-18 22:59
Updated : 2024-11-21 02:35
NVD link : CVE-2015-6459
Mitre link : CVE-2015-6459
CVE.ORG link : CVE-2015-6459
JSON object : View
Products Affected
ge
- mds_pulsenet
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')