Synerion TimeNet version 9.21 contains a directory traversal vulnerability where, on the "Name" parameter, the attacker can return to the root directory and open the host file. This might give the attacker the ability to view restricted files, which could provide the attacker with more information required to further compromise the system.
References
Link | Resource |
---|---|
https://www.gov.il/en/departments/faq/cve_advisories | Third Party Advisory |
https://www.gov.il/en/departments/faq/cve_advisories | Third Party Advisory |
Configurations
History
21 Nov 2024, 06:13
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 5.0
v3 : 5.4 |
References | () https://www.gov.il/en/departments/faq/cve_advisories - Third Party Advisory |
Information
Published : 2021-09-07 12:15
Updated : 2024-11-21 06:13
NVD link : CVE-2021-36717
Mitre link : CVE-2021-36717
CVE.ORG link : CVE-2021-36717
JSON object : View
Products Affected
synerion
- timenet
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')