CVE-2023-5327

A vulnerability was found in SATO CL4NX-J Plus 1.13.2-u455_r2. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /rest/dir/. The manipulation of the argument full leads to path traversal. The attack needs to be initiated within the local network. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-241028.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:sato:cl4nx-j_plus_firmware:1.13.2-u455_r2:*:*:*:*:*:*:*
cpe:2.3:h:sato:cl4nx-j_plus:-:*:*:*:*:*:*:*

History

04 Oct 2023, 14:29

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.5
References (MISC) https://vuldb.com/?id.241028 - (MISC) https://vuldb.com/?id.241028 - Third Party Advisory
References (MISC) https://vuldb.com/?ctiid.241028 - (MISC) https://vuldb.com/?ctiid.241028 - Third Party Advisory
References (MISC) https://github.com/CV3TR4CK/CV3Cyb3R/blob/main/2023/SATO%20CL4NX-J%20Plus%20dir/README.md - (MISC) https://github.com/CV3TR4CK/CV3Cyb3R/blob/main/2023/SATO%20CL4NX-J%20Plus%20dir/README.md - Third Party Advisory
First Time Sato cl4nx-j Plus Firmware
Sato
Sato cl4nx-j Plus
CPE cpe:2.3:o:sato:cl4nx-j_plus_firmware:1.13.2-u455_r2:*:*:*:*:*:*:*
cpe:2.3:h:sato:cl4nx-j_plus:-:*:*:*:*:*:*:*

01 Oct 2023, 23:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-10-01 23:15

Updated : 2024-05-17 02:33


NVD link : CVE-2023-5327

Mitre link : CVE-2023-5327

CVE.ORG link : CVE-2023-5327


JSON object : View

Products Affected

sato

  • cl4nx-j_plus_firmware
  • cl4nx-j_plus
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')