CVE-2023-2913

An executable used in Rockwell Automation ThinManager ThinServer can be configured to enable an API feature in the HTTPS Server Settings. This feature is disabled by default. When the API is enabled and handling requests, a path traversal vulnerability exists that allows a remote actor to leverage the privileges of the server’s file system and read arbitrary files stored in it. A malicious user could exploit this vulnerability by executing a path that contains manipulating variables.
Configurations

Configuration 1 (hide)

cpe:2.3:a:rockwellautomation:thinmanager:*:*:*:*:*:*:*:*

History

27 Jul 2023, 19:51

Type Values Removed Values Added
CPE cpe:2.3:a:rockwellautomation:thinmanager:*:*:*:*:*:*:*:*
References (MISC) https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1140160 - (MISC) https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1140160 - Vendor Advisory
First Time Rockwellautomation thinmanager
Rockwellautomation
CWE CWE-22
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.5

18 Jul 2023, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-07-18 20:15

Updated : 2024-02-28 20:33


NVD link : CVE-2023-2913

Mitre link : CVE-2023-2913

CVE.ORG link : CVE-2023-2913


JSON object : View

Products Affected

rockwellautomation

  • thinmanager
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

CWE-23

Relative Path Traversal