A Directory Traversal issue was discovered in SpiderControl SCADA Web Server. An attacker may be able to use a simple GET request to perform a directory traversal into system files.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/100456 | Third Party Advisory VDB Entry |
https://ics-cert.us-cert.gov/advisories/ICSA-17-234-03 | Mitigation Third Party Advisory US Government Resource |
http://www.securityfocus.com/bid/100456 | Third Party Advisory VDB Entry |
https://ics-cert.us-cert.gov/advisories/ICSA-17-234-03 | Mitigation Third Party Advisory US Government Resource |
Configurations
History
21 Nov 2024, 03:10
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/100456 - Third Party Advisory, VDB Entry | |
References | () https://ics-cert.us-cert.gov/advisories/ICSA-17-234-03 - Mitigation, Third Party Advisory, US Government Resource |
Information
Published : 2017-08-25 19:29
Updated : 2024-11-21 03:10
NVD link : CVE-2017-12694
Mitre link : CVE-2017-12694
CVE.ORG link : CVE-2017-12694
JSON object : View
Products Affected
spidercontrol
- scada_web_server
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')