In Phoenix Contacts ENERGY AXC PU Web service an authenticated restricted user of the web frontend can access, read, write and create files throughout the file system using specially crafted URLs via the upload and download functionality of the web service. This may lead to full control of the service.
References
Link | Resource |
---|---|
https://cert.vde.com/en/advisories/VDE-2023-003/ | Not Applicable |
https://github.com/advisories/GHSA-w923-8w64-f5gh | Third Party Advisory |
https://cert.vde.com/en/advisories/VDE-2023-003/ | Not Applicable |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
History
21 Nov 2024, 07:38
Type | Values Removed | Values Added |
---|---|---|
References | () https://cert.vde.com/en/advisories/VDE-2023-003/ - Not Applicable |
Information
Published : 2023-04-17 08:15
Updated : 2024-11-21 07:38
NVD link : CVE-2023-1109
Mitre link : CVE-2023-1109
CVE.ORG link : CVE-2023-1109
JSON object : View
Products Affected
phoenixcontact
- smartrtu_axc_ig
- energy_axc_pu
- smartrtu_axc_sg_firmware
- infobox
- smartrtu_axc_sg
- smartrtu_axc_ig_firmware
- infobox_firmware
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
NVD-CWE-noinfo