CODESYS V3 web server, all versions prior to 3.5.14.10, allows an attacker to send specially crafted http or https requests which may allow access to files outside the restricted working directory of the controller.
References
Link | Resource |
---|---|
https://www.us-cert.gov/ics/advisories/icsa-19-255-01 | Mitigation Patch Third Party Advisory US Government Resource |
https://www.us-cert.gov/ics/advisories/icsa-19-255-01 | Mitigation Patch Third Party Advisory US Government Resource |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 04:25
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.us-cert.gov/ics/advisories/icsa-19-255-01 - Mitigation, Patch, Third Party Advisory, US Government Resource |
Information
Published : 2019-09-13 17:15
Updated : 2024-11-21 04:25
NVD link : CVE-2019-13532
Mitre link : CVE-2019-13532
CVE.ORG link : CVE-2019-13532
JSON object : View
Products Affected
codesys
- control_for_pfc200
- control_for_pfc100
- control_rte
- control_runtime_system_toolkit
- remote_target_visu_toolkit
- embedded_target_visu_toolkit
- control_for_beaglebone
- control_for_iot2000
- control_for_empc-a\/imx6
- control_for_linux
- hmi
- control_for_raspberry_pi
- control_win
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')