A directory traversal vulnerability exists in the file upload function of the GateManager that allows an authenticated attacker with administrative permissions to read and write arbitrary files in the Linux file system. This issue affects: GateManager all versions prior to 9.2c.
References
Link | Resource |
---|---|
https://www.secomea.com/support/cybersecurity-advisory/#2918 | Vendor Advisory |
https://www.secomea.com/support/cybersecurity-advisory/#2918 | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
History
21 Nov 2024, 05:23
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 5.5
v3 : 9.0 |
References | () https://www.secomea.com/support/cybersecurity-advisory/#2918 - Vendor Advisory |
Information
Published : 2021-02-15 16:15
Updated : 2024-11-21 05:23
NVD link : CVE-2020-29026
Mitre link : CVE-2020-29026
CVE.ORG link : CVE-2020-29026
JSON object : View
Products Affected
secomea
- gatemanager_8250_firmware
- gatemanager_9250_firmware
- gatemanager_4260_firmware
- gatemanager_4260
- gatemanager_4250_firmware
- gatemanager_9250
- gatemanager_4250
- gatemanager_8250
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')