A vulnerability has been identified in Teamcenter Active Workspace V4.3 (All versions < V4.3.11), Teamcenter Active Workspace V5.0 (All versions < V5.0.10), Teamcenter Active Workspace V5.1 (All versions < V5.1.6), Teamcenter Active Workspace V5.2 (All versions < V5.2.3). The application contains an unsafe unzipping pattern that could lead to a zip path traversal attack. This could allow and attacker to execute a remote shell with admin rights.
References
Link | Resource |
---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-133772.pdf | Patch Vendor Advisory |
https://cert-portal.siemens.com/productcert/pdf/ssa-133772.pdf | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 06:26
Type | Values Removed | Values Added |
---|---|---|
References | () https://cert-portal.siemens.com/productcert/pdf/ssa-133772.pdf - Patch, Vendor Advisory |
Information
Published : 2021-12-14 12:15
Updated : 2024-11-21 06:26
NVD link : CVE-2021-41547
Mitre link : CVE-2021-41547
CVE.ORG link : CVE-2021-41547
JSON object : View
Products Affected
siemens
- teamcenter_active_workspace
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')